Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2016-4997 (GCVE-0-2016-4997)
Vulnerability from cvelistv5
Published
2016-07-03 21:00
Modified
2024-08-06 00:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:46:40.226Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SUSE-SU-2016:2180", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "SUSE-SU-2016:1709", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "name": "USN-3017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "SUSE-SU-2016:1985", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "USN-3017-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "name": "RHSA-2016:1847", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "name": "openSUSE-SU-2016:2184", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-3018-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "name": "SUSE-SU-2016:2174", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "name": "USN-3017-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "name": "RHSA-2016:1875", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "name": "USN-3019-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "name": "SUSE-SU-2016:2018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "name": "DSA-3607", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "USN-3016-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "name": "USN-3016-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "name": "[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "name": "SUSE-SU-2016:2181", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "name": "SUSE-SU-2016:2178", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "name": "40435", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40435/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "USN-3018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "name": "1036171", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036171" }, { "name": "40489", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/40489/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "name": "SUSE-SU-2016:2177", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "name": "RHSA-2016:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "name": "SUSE-SU-2016:2179", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "name": "SUSE-SU-2016:2105", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "USN-3016-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "name": "SUSE-SU-2016:1710", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "name": "[oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "name": "USN-3016-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "name": "91451", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/91451" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "USN-3020-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "name": "SUSE-SU-2016:1937", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "SUSE-SU-2016:2180", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "SUSE-SU-2016:1709", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "name": "USN-3017-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "SUSE-SU-2016:1985", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "USN-3017-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "name": "RHSA-2016:1847", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "name": "openSUSE-SU-2016:2184", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "USN-3018-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "name": "SUSE-SU-2016:2174", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "name": "USN-3017-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "name": "RHSA-2016:1875", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "name": "USN-3019-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "name": "SUSE-SU-2016:2018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "name": "DSA-3607", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "USN-3016-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "name": "USN-3016-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "name": "[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "name": "SUSE-SU-2016:2181", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "name": "SUSE-SU-2016:2178", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "name": "40435", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40435/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "USN-3018-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "name": "1036171", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036171" }, { "name": "40489", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/40489/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "name": "SUSE-SU-2016:2177", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "name": "RHSA-2016:1883", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "name": "SUSE-SU-2016:2179", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "name": "SUSE-SU-2016:2105", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "USN-3016-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "name": "SUSE-SU-2016:1710", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "name": "[oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "name": "USN-3016-4", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "name": "91451", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/91451" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "USN-3020-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "name": "SUSE-SU-2016:1937", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2016-4997", "datePublished": "2016-07-03T21:00:00", "dateReserved": "2016-05-24T00:00:00", "dateUpdated": "2024-08-06T00:46:40.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2016-4997\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2016-07-03T21:59:16.057\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.\"},{\"lang\":\"es\",\"value\":\"Las implementaciones de compat IPT_SO_SET_REPLACE y IP6T_SO_SET_REPLACE setsockopt en el subsistema netfilter en el kernel de Linux antes de 4.6.3 permiten a los usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) aprovechando el acceso del root en el contenedor para proporcionar un valor de compensaci\u00f3n manipulado que desencadena una disminuci\u00f3n no intencionada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.6.17\",\"versionEndExcluding\":\"3.2.80\",\"matchCriteriaId\":\"14022F90-39CA-4DE4-B584-6380B9F657B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.3\",\"versionEndExcluding\":\"3.10.103\",\"matchCriteriaId\":\"0DC9AE03-9DF2-4168-8542-1171CB42C604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11\",\"versionEndExcluding\":\"3.12.62\",\"matchCriteriaId\":\"CB3CF40A-6C26-4C0B-B6F1-41BE884182DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.13\",\"versionEndExcluding\":\"3.14.73\",\"matchCriteriaId\":\"1346A01D-227D-4D11-8C7A-ADBAE630C87D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.15\",\"versionEndExcluding\":\"3.16.37\",\"matchCriteriaId\":\"7DEF7E2D-A1AA-4733-A573-11EE52A2B419\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.17\",\"versionEndExcluding\":\"3.18.37\",\"matchCriteriaId\":\"B55F09A2-F470-41BA-9585-40E8C1960ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.19\",\"versionEndExcluding\":\"4.1.28\",\"matchCriteriaId\":\"2BACB680-D42D-4EFF-9B8B-121AA348DB7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.4.14\",\"matchCriteriaId\":\"06B86F5B-ACB3-42F5-B15C-0EEB47DF8809\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.5\",\"versionEndExcluding\":\"4.6.3\",\"matchCriteriaId\":\"0911A351-61CB-4070-A172-8AD9BC1871AE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"336EC5B8-6FD8-42BB-9530-58A15238CEE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA04C9F1-6257-4D82-BA0B-37DE66D94736\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6359EF76-9371-4418-8694-B604CF02CF63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCAAE4A1-D542-43F3-B7FC-685BCDB248D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A961CBC6-3CA1-4A0F-BBE0-8F6315781B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2905A9C-3E00-4188-8341-E5C2F62EF405\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"81D94366-47D6-445A-A811-39327B150FCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF461FB4-8BA5-4065-9A69-DC017D3611C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F003591-0639-476C-A014-03F06A274880\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"104DA87B-DEE4-4262-AE50-8E6BC43B228B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1847.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1875.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1883.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3607\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/24/5\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/09/29/10\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91451\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036171\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-4\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-3\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3018-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3018-2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3019-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3020-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1349722\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40435/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40489/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1847.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1875.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1883.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2016/dsa-3607\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/06/24/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2016/09/29/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/91451\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1036171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3016-4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3017-3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3018-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3018-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3019-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-3020-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1349722\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/40435/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40489/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}" } }
fkie_cve-2016-4997
Vulnerability from fkie_nvd
Published
2016-07-03 21:59
Modified
2025-04-12 10:46
Severity ?
Summary
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c | Vendor Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1847.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1875.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2016-1883.html | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2016/dsa-3607 | Third Party Advisory | |
secalert@redhat.com | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3 | Vendor Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/06/24/5 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2016/09/29/10 | Exploit, Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | Third Party Advisory | |
secalert@redhat.com | http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html | Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/91451 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.securitytracker.com/id/1036171 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3016-1 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3016-2 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3016-3 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3016-4 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3017-1 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3017-2 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3017-3 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3018-1 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3018-2 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3019-1 | Third Party Advisory | |
secalert@redhat.com | http://www.ubuntu.com/usn/USN-3020-1 | Third Party Advisory | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1349722 | Issue Tracking, Third Party Advisory | |
secalert@redhat.com | https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt | Exploit, Third Party Advisory | |
secalert@redhat.com | https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c | Patch, Third Party Advisory | |
secalert@redhat.com | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541 | Third Party Advisory | |
secalert@redhat.com | https://www.exploit-db.com/exploits/40435/ | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://www.exploit-db.com/exploits/40489/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1847.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1875.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2016-1883.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2016/dsa-3607 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/06/24/5 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2016/09/29/10 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91451 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036171 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3016-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3016-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3016-3 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3016-4 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3017-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3017-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3017-3 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3018-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3018-2 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3019-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-3020-1 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1349722 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40435/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40489/ | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
linux | linux_kernel | * | |
canonical | ubuntu_linux | 12.04 | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 15.10 | |
canonical | ubuntu_linux | 16.04 | |
novell | suse_linux_enterprise_software_development_kit | 12.0 | |
novell | suse_linux_enterprise_software_development_kit | 12.0 | |
novell | suse_linux_enterprise_desktop | 12.0 | |
novell | suse_linux_enterprise_desktop | 12.0 | |
novell | suse_linux_enterprise_live_patching | 12.0 | |
novell | suse_linux_enterprise_module_for_public_cloud | 12.0 | |
novell | suse_linux_enterprise_real_time_extension | 12.0 | |
novell | suse_linux_enterprise_server | 12.0 | |
novell | suse_linux_enterprise_server | 12.0 | |
novell | suse_linux_enterprise_workstation_extension | 12.0 | |
novell | suse_linux_enterprise_workstation_extension | 12.0 | |
oracle | linux | 7 | |
debian | debian_linux | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "14022F90-39CA-4DE4-B584-6380B9F657B7", "versionEndExcluding": "3.2.80", "versionStartIncluding": "2.6.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DC9AE03-9DF2-4168-8542-1171CB42C604", "versionEndExcluding": "3.10.103", "versionStartIncluding": "3.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB3CF40A-6C26-4C0B-B6F1-41BE884182DA", "versionEndExcluding": "3.12.62", "versionStartIncluding": "3.11", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "1346A01D-227D-4D11-8C7A-ADBAE630C87D", "versionEndExcluding": "3.14.73", "versionStartIncluding": "3.13", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DEF7E2D-A1AA-4733-A573-11EE52A2B419", "versionEndExcluding": "3.16.37", "versionStartIncluding": "3.15", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "B55F09A2-F470-41BA-9585-40E8C1960ABA", "versionEndExcluding": "3.18.37", "versionStartIncluding": "3.17", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BACB680-D42D-4EFF-9B8B-121AA348DB7A", "versionEndExcluding": "4.1.28", "versionStartIncluding": "3.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "06B86F5B-ACB3-42F5-B15C-0EEB47DF8809", "versionEndExcluding": "4.4.14", "versionStartIncluding": "4.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "0911A351-61CB-4070-A172-8AD9BC1871AE", "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "336EC5B8-6FD8-42BB-9530-58A15238CEE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "01E6CAD9-DC1F-4C7C-8C8E-98E4BFABAC94", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "EA04C9F1-6257-4D82-BA0B-37DE66D94736", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "6359EF76-9371-4418-8694-B604CF02CF63", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "CCAAE4A1-D542-43F3-B7FC-685BCDB248D5", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "A961CBC6-3CA1-4A0F-BBE0-8F6315781B7C", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "B2905A9C-3E00-4188-8341-E5C2F62EF405", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "C384D0B6-8A5C-45CA-8CD9-7F4E967FE4F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "81D94366-47D6-445A-A811-39327B150FCD", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF461FB4-8BA5-4065-9A69-DC017D3611C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "1F003591-0639-476C-A014-03F06A274880", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "matchCriteriaId": "104DA87B-DEE4-4262-AE50-8E6BC43B228B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement." }, { "lang": "es", "value": "Las implementaciones de compat IPT_SO_SET_REPLACE y IP6T_SO_SET_REPLACE setsockopt en el subsistema netfilter en el kernel de Linux antes de 4.6.3 permiten a los usuarios locales obtener privilegios o provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) aprovechando el acceso del root en el contenedor para proporcionar un valor de compensaci\u00f3n manipulado que desencadena una disminuci\u00f3n no intencionada." } ], "id": "CVE-2016-4997", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-07-03T21:59:16.057", "references": [ { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91451" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036171" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40435/" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40489/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40435/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40489/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
suse-su-2016:2174-1
Vulnerability from csaf_suse
Published
2016-08-29 09:26
Modified
2016-08-29 09:26
Summary
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 0 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.49-11 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1288
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.49-11 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1288", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2174-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2174-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162174-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2174-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002231.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 0 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:26:24Z", "generator": { "date": "2016-08-29T09:26:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2174-1", "initial_release_date": "2016-08-29T09:26:24Z", "revision_history": [ { "date": "2016-08-29T09:26:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-default-6-17.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_49-11-xen-6-17.2.x86_64", "product": { "name": "kgraft-patch-3_12_49-11-xen-6-17.2.x86_64", "product_id": "kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-default-6-17.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_49-11-xen-6-17.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" }, "product_reference": "kgraft-patch-3_12_49-11-xen-6-17.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:24Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:24Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-default-6-17.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_49-11-xen-6-17.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:24Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:2181-1
Vulnerability from csaf_suse
Published
2016-08-29 09:26
Modified
2016-08-29 09:26
Summary
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 1 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_20 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1289
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_20 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1289", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2181-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2181-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162181-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2181-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002237.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 1 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:26:33Z", "generator": { "date": "2016-08-29T09:26:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2181-1", "initial_release_date": "2016-08-29T09:26:33Z", "revision_history": [ { "date": "2016-08-29T09:26:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:33Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:33Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-default-6-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_20-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:33Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:2636-1
Vulnerability from csaf_suse
Published
2016-10-25 21:19
Modified
2016-10-25 21:19
Summary
Security update for Linux Kernel Live Patch 9 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 9 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_31 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 9 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_31 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1553,SUSE-SLE-SERVER-12-2016-1553", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2636-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2636-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162636-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2636-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002360.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 9 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:19:25Z", "generator": { "date": "2016-10-25T21:19:25Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2636-1", "initial_release_date": "2016-10-25T21:19:25Z", "revision_history": [ { "date": "2016-10-25T21:19:25Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:25Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-default-6-5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_31-xen-6-5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:25Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:1710-1
Vulnerability from csaf_suse
Published
2016-06-30 15:29
Modified
2016-06-30 15:29
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA kernel was updated to receive one critical security fix.
Security issue fixed:
- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)
Patchnames
SUSE-SLE-DESKTOP-12-2016-1013,SUSE-SLE-Live-Patching-12-2016-1013,SUSE-SLE-Module-Public-Cloud-12-2016-1013,SUSE-SLE-SDK-12-2016-1013,SUSE-SLE-SERVER-12-2016-1013,SUSE-SLE-WE-12-2016-1013
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 GA kernel was updated to receive one critical security fix.\n\nSecurity issue fixed:\n- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-2016-1013,SUSE-SLE-Live-Patching-12-2016-1013,SUSE-SLE-Module-Public-Cloud-12-2016-1013,SUSE-SLE-SDK-12-2016-1013,SUSE-SLE-SERVER-12-2016-1013,SUSE-SLE-WE-12-2016-1013", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1710-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1710-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161710-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1710-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002144.html" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-06-30T15:29:48Z", "generator": { "date": "2016-06-30T15:29:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1710-1", "initial_release_date": "2016-06-30T15:29:48Z", "revision_history": [ { "date": "2016-06-30T15:29:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.60-52.54.1.noarch", "product": { "name": "kernel-devel-3.12.60-52.54.1.noarch", "product_id": "kernel-devel-3.12.60-52.54.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.60-52.54.1.noarch", "product": { "name": "kernel-macros-3.12.60-52.54.1.noarch", "product_id": "kernel-macros-3.12.60-52.54.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.60-52.54.1.noarch", "product": { "name": "kernel-source-3.12.60-52.54.1.noarch", "product_id": "kernel-source-3.12.60-52.54.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.60-52.54.3.noarch", "product": { "name": "kernel-docs-3.12.60-52.54.3.noarch", "product_id": "kernel-docs-3.12.60-52.54.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.60-52.54.3.ppc64le", "product": { "name": "kernel-obs-build-3.12.60-52.54.3.ppc64le", "product_id": "kernel-obs-build-3.12.60-52.54.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.60-52.54.2.ppc64le", "product": { "name": "kernel-default-3.12.60-52.54.2.ppc64le", "product_id": "kernel-default-3.12.60-52.54.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.54.2.ppc64le", "product": { "name": "kernel-default-base-3.12.60-52.54.2.ppc64le", "product_id": "kernel-default-base-3.12.60-52.54.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.54.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.60-52.54.2.ppc64le", "product_id": "kernel-default-devel-3.12.60-52.54.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.54.1.ppc64le", "product": { "name": "kernel-syms-3.12.60-52.54.1.ppc64le", "product_id": "kernel-syms-3.12.60-52.54.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.60-52.54.3.s390x", "product": { "name": "kernel-obs-build-3.12.60-52.54.3.s390x", "product_id": "kernel-obs-build-3.12.60-52.54.3.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.60-52.54.2.s390x", "product": { "name": "kernel-default-3.12.60-52.54.2.s390x", "product_id": "kernel-default-3.12.60-52.54.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.54.2.s390x", "product": { "name": "kernel-default-base-3.12.60-52.54.2.s390x", "product_id": "kernel-default-base-3.12.60-52.54.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.54.2.s390x", "product": { "name": "kernel-default-devel-3.12.60-52.54.2.s390x", "product_id": "kernel-default-devel-3.12.60-52.54.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.60-52.54.2.s390x", "product": { "name": "kernel-default-man-3.12.60-52.54.2.s390x", "product_id": "kernel-default-man-3.12.60-52.54.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.54.1.s390x", "product": { "name": "kernel-syms-3.12.60-52.54.1.s390x", "product_id": "kernel-syms-3.12.60-52.54.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-default-3.12.60-52.54.2.x86_64", "product_id": "kernel-default-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-default-devel-3.12.60-52.54.2.x86_64", "product_id": "kernel-default-devel-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-default-extra-3.12.60-52.54.2.x86_64", "product_id": "kernel-default-extra-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.60-52.54.1.x86_64", "product": { "name": "kernel-syms-3.12.60-52.54.1.x86_64", "product_id": "kernel-syms-3.12.60-52.54.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-xen-3.12.60-52.54.2.x86_64", "product_id": "kernel-xen-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.60-52.54.2.x86_64", "product_id": "kernel-xen-devel-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-ec2-3.12.60-52.54.2.x86_64", "product_id": "kernel-ec2-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.60-52.54.2.x86_64", "product_id": "kernel-ec2-devel-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.60-52.54.2.x86_64", "product_id": "kernel-ec2-extra-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.60-52.54.3.x86_64", "product": { "name": "kernel-obs-build-3.12.60-52.54.3.x86_64", "product_id": "kernel-obs-build-3.12.60-52.54.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-default-base-3.12.60-52.54.2.x86_64", "product_id": "kernel-default-base-3.12.60-52.54.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.60-52.54.2.x86_64", "product": { "name": "kernel-xen-base-3.12.60-52.54.2.x86_64", "product_id": "kernel-xen-base-3.12.60-52.54.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12", "product": { "name": "SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12", "product": { "name": "SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.54.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Desktop 12", "product_id": "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-ec2-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.60-52.54.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.54.3.noarch" }, "product_reference": "kernel-docs-3.12.60-52.54.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.60-52.54.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.ppc64le" }, "product_reference": "kernel-obs-build-3.12.60-52.54.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.60-52.54.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.s390x" }, "product_reference": "kernel-obs-build-3.12.60-52.54.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.60-52.54.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12", "product_id": "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.x86_64" }, "product_reference": "kernel-obs-build-3.12.60-52.54.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-man-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.ppc64le as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.ppc64le" }, "product_reference": "kernel-syms-3.12.60-52.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.s390x as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.s390x" }, "product_reference": "kernel-syms-3.12.60-52.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server 12", "product_id": "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-base-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.60-52.54.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.54.2.s390x" }, "product_reference": "kernel-default-man-3.12.60-52.54.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-devel-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-macros-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.60-52.54.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.54.1.noarch" }, "product_reference": "kernel-source-3.12.60-52.54.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.ppc64le" }, "product_reference": "kernel-syms-3.12.60-52.54.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.s390x" }, "product_reference": "kernel-syms-3.12.60-52.54.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.60-52.54.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.x86_64" }, "product_reference": "kernel-syms-3.12.60-52.54.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.60-52.54.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12", "product_id": "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.54.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.60-52.54.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.54.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.54.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.54.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.54.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-default-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Desktop 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Desktop 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_60-52_54-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-man-3.12.60-52.54.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.60-52.54.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.60-52.54.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.60-52.54.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12:kernel-docs-3.12.60-52.54.3.noarch", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.s390x", "SUSE Linux Enterprise Software Development Kit 12:kernel-obs-build-3.12.60-52.54.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12:kernel-default-extra-3.12.60-52.54.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-30T15:29:48Z", "details": "important" } ], "title": "CVE-2016-4997" } ] }
suse-su-2017:0471-1
Vulnerability from csaf_suse
Published
2017-02-15 16:20
Modified
2017-02-15 16:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.
The following feature was implemented:
- The ext2 filesystem got reenabled and supported to allow support for 'XIP' (Execute In Place) (FATE#320805).
The following security bugs were fixed:
- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).
- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).
- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).
- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a 'state machine confusion bug (bnc#1007197).
- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
The following non-security bugs were fixed:
- base: make module_create_drivers_dir race-free (bnc#983977).
- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: fix relocation incorrectly dropping data references (bsc#990384).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- btrfs: increment ctx->pos for every emitted or skipped dirent in readdir (bsc#981709).
- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- ext4: Fixup handling for custom configs in tuning.
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)
- ipv6: KABI workaround for ipv6: add complete rcu protection around np->opt.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: reintroduce sk_filter (kabi).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: ignore zombie tasks during the patching (bnc#1008979).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).
- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).
- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).
- netfilter: allow logging fron non-init netns (bsc#970083).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- reiserfs: fix race in prealloc discard (bsc#987576).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: Increase REPORT_LUNS timeout (bsc#982282).
- series.conf: move stray netfilter patches to the right section
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- supported.conf: Add ext2
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tty: audit: Fix audit source (bsc#1016482).
- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)
- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
- xfs: refactor xlog_recover_process_data() (bsc#1019300).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 GA LTSS kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nThe following feature was implemented:\n\n- The ext2 filesystem got reenabled and supported to allow support for \u0027XIP\u0027 (Execute In Place) (FATE#320805).\n\n\nThe following security bugs were fixed:\n\n- CVE-2017-5551: The tmpfs filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#1021258).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-2583: A Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. A user/process inside guest could have used this flaw to crash the guest resulting in DoS or potentially escalate their privileges inside guest. (bsc#1020602).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2016-8645: The TCP stack in the Linux kernel mishandled skb truncation, which allowed local users to cause a denial of service (system crash) via a crafted application that made sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c (bnc#1009969).\n- CVE-2016-8399: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935 (bnc#1014746).\n- CVE-2016-9806: Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel allowed local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that made sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated (bnc#1013540).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-7913: The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure (bnc#1010478).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2015-8963: Race condition in kernel/events/core.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation (bnc#1010502).\n- CVE-2016-7914: The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel did not check whether a slot is a leaf, which allowed local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite (bnc#1010475).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-9083: drivers/vfio/pci/vfio_pci.c in the Linux kernel allowed local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \u0027state machine confusion bug (bnc#1007197).\n- CVE-2016-9084: drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel misused the kzalloc function, which allowed local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file (bnc#1007197).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bnc#1004462).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6327: drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation (bnc#994748).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362 bnc#986365).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n\nThe following non-security bugs were fixed:\n\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- btrfs-8448-improve-performance-on-fsync-against-new-inode.patch: Disable (bsc#981597).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#994881).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: fix relocation incorrectly dropping data references (bsc#990384).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- btrfs: increment ctx-\u003epos for every emitted or skipped dirent in readdir (bsc#981709).\n- btrfs: remove old tree_root dirent processing in btrfs_real_readdir() (bsc#981709).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- ext2: Enable ext2 driver in config files (bsc#976195, fate#320805)\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- ext4: Fixup handling for custom configs in tuning.\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257)\n- ipv6: KABI workaround for ipv6: add complete rcu protection around np-\u003eopt.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: reintroduce sk_filter (kabi).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).\n- kgr: ignore zombie tasks during the patching (bnc#1008979).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- modsign: Print appropriate status message when accessing UEFI variable (bsc#958606).\n- mpi: Fix NULL ptr dereference in mpi_powm() [ver #3] (bsc#1011820).\n- mpt3sas: Fix panic when aer correct error occurred (bsc#997708, bsc#999943).\n- netfilter: allow logging fron non-init netns (bsc#970083).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- pci/aer: Clear error status registers during enumeration and restore (bsc#985978).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: Increase REPORT_LUNS timeout (bsc#982282).\n- series.conf: move stray netfilter patches to the right section\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- supported.conf: Add ext2\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tty: audit: Fix audit source (bsc#1016482).\n- tty: Prevent ldisc drivers from re-using stale tty fields (bnc#1010507).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- xen: Fix refcnt regression in xen netback introduced by changes made for bug#881008 (bnc#978094)\n- xfs: allow lazy sb counter sync during filesystem freeze sequence (bsc#980560).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n- xfs: refactor xlog_recover_process_data() (bsc#1019300).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Module-Public-Cloud-12-2017-247,SUSE-SLE-SAP-12-2017-247,SUSE-SLE-SERVER-12-2017-247", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0471-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0471-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0471-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-February/002647.html" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1007197", "url": "https://bugzilla.suse.com/1007197" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1008979", "url": "https://bugzilla.suse.com/1008979" }, { "category": "self", "summary": "SUSE Bug 1009969", "url": "https://bugzilla.suse.com/1009969" }, { "category": "self", "summary": "SUSE Bug 1010040", "url": "https://bugzilla.suse.com/1010040" }, { "category": "self", "summary": "SUSE Bug 1010475", "url": "https://bugzilla.suse.com/1010475" }, { "category": "self", "summary": "SUSE Bug 1010478", "url": "https://bugzilla.suse.com/1010478" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010502", "url": "https://bugzilla.suse.com/1010502" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011820", "url": "https://bugzilla.suse.com/1011820" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013540", "url": "https://bugzilla.suse.com/1013540" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1016482", "url": "https://bugzilla.suse.com/1016482" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017589", "url": "https://bugzilla.suse.com/1017589" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1019300", "url": "https://bugzilla.suse.com/1019300" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 881008", "url": "https://bugzilla.suse.com/881008" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 958606", "url": "https://bugzilla.suse.com/958606" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980560", "url": "https://bugzilla.suse.com/980560" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 981709", "url": "https://bugzilla.suse.com/981709" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 986941", "url": "https://bugzilla.suse.com/986941" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 990384", "url": "https://bugzilla.suse.com/990384" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994748", "url": "https://bugzilla.suse.com/994748" }, { "category": "self", "summary": "SUSE Bug 994881", "url": "https://bugzilla.suse.com/994881" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE Bug 999943", "url": "https://bugzilla.suse.com/999943" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8963 page", "url": "https://www.suse.com/security/cve/CVE-2015-8963/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7914 page", "url": "https://www.suse.com/security/cve/CVE-2016-7914/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8645 page", "url": "https://www.suse.com/security/cve/CVE-2016-8645/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9083 page", "url": "https://www.suse.com/security/cve/CVE-2016-9083/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9084 page", "url": "https://www.suse.com/security/cve/CVE-2016-9084/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9806 page", "url": "https://www.suse.com/security/cve/CVE-2016-9806/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-02-15T16:20:32Z", "generator": { "date": "2017-02-15T16:20:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0471-1", "initial_release_date": "2017-02-15T16:20:32Z", "revision_history": [ { "date": "2017-02-15T16:20:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.61-52.66.1.noarch", "product": { "name": "kernel-devel-3.12.61-52.66.1.noarch", "product_id": "kernel-devel-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.61-52.66.1.noarch", "product": { "name": "kernel-macros-3.12.61-52.66.1.noarch", "product_id": "kernel-macros-3.12.61-52.66.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.61-52.66.1.noarch", "product": { "name": "kernel-source-3.12.61-52.66.1.noarch", "product_id": "kernel-source-3.12.61-52.66.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-base-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "product_id": "kernel-default-devel-3.12.61-52.66.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le", "product_id": "kernel-syms-3.12.61-52.66.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-3.12.61-52.66.1.s390x", "product_id": "kernel-default-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-base-3.12.61-52.66.1.s390x", "product_id": "kernel-default-base-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x", "product_id": "kernel-default-devel-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product": { "name": "kernel-default-man-3.12.61-52.66.1.s390x", "product_id": "kernel-default-man-3.12.61-52.66.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.s390x", "product": { "name": "kernel-syms-3.12.61-52.66.1.s390x", "product_id": "kernel-syms-3.12.61-52.66.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "product_id": "kernel-ec2-extra-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-default-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-syms-3.12.61-52.66.1.x86_64", "product_id": "kernel-syms-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-base-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "product_id": "kernel-xen-devel-3.12.61-52.66.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "product_id": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-default-man-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-devel-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-macros-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.61-52.66.1.noarch as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch" }, "product_reference": "kernel-source-3.12.61-52.66.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.ppc64le as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le" }, "product_reference": "kernel-syms-3.12.61-52.66.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.s390x as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x" }, "product_reference": "kernel-syms-3.12.61-52.66.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-syms-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.61-52.66.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.61-52.66.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8963", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8963" } ], "notes": [ { "category": "general", "text": "Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8963", "url": "https://www.suse.com/security/cve/CVE-2015-8963" }, { "category": "external", "summary": "SUSE Bug 1010502 for CVE-2015-8963", "url": "https://bugzilla.suse.com/1010502" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2015-8963" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-7914", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7914" } ], "notes": [ { "category": "general", "text": "The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7914", "url": "https://www.suse.com/security/cve/CVE-2016-7914" }, { "category": "external", "summary": "SUSE Bug 1010475 for CVE-2016-7914", "url": "https://bugzilla.suse.com/1010475" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-7914" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8645", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8645" } ], "notes": [ { "category": "general", "text": "The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8645", "url": "https://www.suse.com/security/cve/CVE-2016-8645" }, { "category": "external", "summary": "SUSE Bug 1009969 for CVE-2016-8645", "url": "https://bugzilla.suse.com/1009969" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-8645" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-8658" }, { "cve": "CVE-2016-9083", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9083" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci.c in the Linux kernel through 4.8.11 allows local users to bypass integer overflow checks, and cause a denial of service (memory corruption) or have unspecified other impact, by leveraging access to a vfio PCI device file for a VFIO_DEVICE_SET_IRQS ioctl call, aka a \"state machine confusion bug.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9083", "url": "https://www.suse.com/security/cve/CVE-2016-9083" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9083", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9083" }, { "cve": "CVE-2016-9084", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9084" } ], "notes": [ { "category": "general", "text": "drivers/vfio/pci/vfio_pci_intrs.c in the Linux kernel through 4.8.11 misuses the kzalloc function, which allows local users to cause a denial of service (integer overflow) or have unspecified other impact by leveraging access to a vfio PCI device file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9084", "url": "https://www.suse.com/security/cve/CVE-2016-9084" }, { "category": "external", "summary": "SUSE Bug 1007197 for CVE-2016-9084", "url": "https://bugzilla.suse.com/1007197" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "low" } ], "title": "CVE-2016-9084" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2016-9806", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9806" } ], "notes": [ { "category": "general", "text": "Race condition in the netlink_dump function in net/netlink/af_netlink.c in the Linux kernel before 4.6.3 allows local users to cause a denial of service (double free) or possibly have unspecified other impact via a crafted application that makes sendmsg system calls, leading to a free operation associated with a new dump that started earlier than anticipated.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9806", "url": "https://www.suse.com/security/cve/CVE-2016-9806" }, { "category": "external", "summary": "SUSE Bug 1013540 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1013540" }, { "category": "external", "summary": "SUSE Bug 1017589 for CVE-2016-9806", "url": "https://bugzilla.suse.com/1017589" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "important" } ], "title": "CVE-2016-9806" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-default-man-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.ppc64le", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.s390x", "SUSE Linux Enterprise Server 12-LTSS:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-default-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-devel-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-macros-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-source-3.12.61-52.66.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-syms-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-base-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kernel-xen-devel-3.12.61-52.66.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-default-1-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_61-52_66-xen-1-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-02-15T16:20:32Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:2633-1
Vulnerability from csaf_suse
Published
2016-10-25 21:18
Modified
2016-10-25 21:18
Summary
Security update for Linux Kernel Live Patch 11 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 11 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_39 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 11 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_39 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1548,SUSE-SLE-SERVER-12-2016-1548", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2633-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2633-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162633-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2633-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002357.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 11 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:18:09Z", "generator": { "date": "2016-10-25T21:18:09Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2633-1", "initial_release_date": "2016-10-25T21:18:09Z", "revision_history": [ { "date": "2016-10-25T21:18:09Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:09Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-default-5-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_39-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:18:09Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2017:2342-1
Vulnerability from csaf_suse
Published
2017-09-04 13:37
Modified
2017-09-04 13:37
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bsc#1032340).
- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bnc#979021).
- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374 bsc#1008850).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the 'lp' parameter could be used to bypass certain secure boot settings. (bnc#1039456).
- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010) (bnc#1039348).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).
- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).
- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bsc#1049603).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565 bsc#1028372).
- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024 bsc#1033287).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly manages lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).
- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the 'dead' type (bnc#1029850).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52 (bnc#1030573).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls (bnc#1031579).
- CVE-2017-7482: Fixed a potential overflow in the net/rxprc where a padded len isn't checked in ticket decode (bsc#1046107).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).
- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bsc#1049483).
- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182 bsc#1038982).
- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1037183 bsc#1038981).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
The following non-security bugs were fixed:
- 8250: use callbacks to access UART_DLL/UART_DLM.
- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).
- af_key: Add lock to key dump (bsc#1047653).
- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).
- alsa: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).
- alsa: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).
- alsa: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).
- alsa: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).
- alsa: hda - using uninitialized data (bsc#1045538).
- alsa: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).
- alsa: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).
- ath9k: fix buffer overrun for ar9287 (bsc#1045538).
- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).
- blacklist.conf: Add a few inapplicable items (bsc#1045538).
- blacklist.conf: blacklisted 1fe89e1b6d27 (bnc#1046122)
- block: do not allow updates through sysfs until registration completes (bsc#1047027).
- block: fix ext_dev_lock lockdep report (bsc#1050154).
- btrfs: Don't clear SGID when inheriting ACLs (bsc#1030552).
- cifs: backport prepath matching fix (bsc#799133).
- cifs: don't compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975).
- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).
- cifs: Timeout on SMBNegotiate request (bsc#1044913).
- clocksource: Remove 'weak' from clocksource_default_clock() declaration (bnc#1013018).
- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).
- crypto: nx - off by one bug in nx_of_update_msc() (fate#314588,bnc#792863).
- decompress_bunzip2: off by one in get_next_block() (git-fixes).
- devres: fix a for loop bounds check (git-fixes).
- dlm: backport 'fix lvb invalidation conditions' (bsc#1005651).
- dm: fix ioctl retry termination with signal (bsc#1050154).
- drm/mgag200: Add support for G200eH3 (bnc#1044216, fate#323551)
- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)
- edac, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr() (fate#313937).
- enic: set skb->hash type properly (bsc#911105 FATE#317501).
- ext2: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext3: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext4: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).
- ext4: fix mballoc breakage with 64k block size (bsc#1013018).
- ext4: fix stack memory corruption with 64k block size (bsc#1013018).
- ext4: keep existing extra fields when inode expands (bsc#1013018).
- ext4: reject inodes with negative size (bsc#1013018).
- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).
- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).
- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).
- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fnic: Using rport->dd_data to check rport online instead of rport_lookup (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).
- fuse: add missing FR_FORCE (bsc#1013018).
- fuse: initialize fc->release before calling it (bsc#1013018).
- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).
- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).
- i40e: avoid null pointer dereference (bsc#909486 FATE#317393).
- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).
- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).
- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).
- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).
- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).
- i40e: Impose a lower limit on gso size (bsc#985561).
- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).
- ib/mlx4: Demote mcg message from warning to debug (bsc#919382).
- ib/mlx4: Fix ib device initialization error flow (bsc#919382).
- ib/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).
- ib/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).
- ib/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).
- ib/mlx4: Set traffic class in AH (bsc#919382).
- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).
- initial cr0 bits (bnc#1036056, LTC#153612).
- input: cm109 - validate number of endpoints before using them (bsc#1037193).
- input: hanwang - validate number of endpoints before using them (bsc#1037232).
- input: yealink - validate number of endpoints before using them (bsc#1037227).
- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).
- irq: Fix race condition (bsc#1042615).
- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).
- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).
- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).
- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).
- jsm: add support for additional Neo cards (bsc#1045615).
- kabi fix (bsc#1008893).
- kABI: mask struct xfs_icdinode change (bsc#1024788).
- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).
- kabi:severeties: Add splice_write_to_file PASS This function is part of an xfs-specific fix which never went upstream and is not expected to have 3rdparty users other than xfs itself.
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- keys: Disallow keyrings beginning with '.' to be joined as session keyrings (bnc#1035576).
- kvm: kvm_io_bus_unregister_dev() should never fail.
- libata: fix sff host state machine locking while polling (bsc#1045525).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).
- libfc: fixup locking in fc_disc_stop() (bsc#1029140).
- libfc: move 'pending' and 'requested' setting (bsc#1029140).
- libfc: only restart discovery after timeout if not already running (bsc#1029140).
- lockd: use init_utsname for id encoding (bsc#1033804).
- lockd: use rpc client's cl_nodename for id encoding (bsc#1033804).
- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).
- math64: New div64_u64_rem helper (bnc#938352).
- md: ensure md devices are freed before module is unloaded (git-fixes).
- md: fix a null dereference (bsc#1040351).
- md: flush ->event_work before stopping array (git-fixes).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md/linear: shutup lockdep warnning (bsc#1018446).
- md: make sure GET_ARRAY_INFO ioctl reports correct 'clean' status (git-fixes).
- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).
- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).
- md/raid1: fix test for 'was read error from last working device' (git-fixes).
- md/raid5: do not record new size if resize_stripes fails (git-fixes).
- md/raid5: Fix CPU hotplug callback registration (git-fixes).
- md: use separate bio_pool for metadata writes (bsc#1040351).
- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).
- mlx4: reduce OOM risk on arches with large pages (bsc#919382).
- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).
- mmc: ushc: fix NULL-deref at probe (bsc#1037191).
- mm: do not collapse stack gap into THP (bnc#1039348)
- mm: enlarge stack guard gap (bnc#1039348).
- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).
- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).
- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).
- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).
- mm, mmap: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348, bnc#1045340, bnc#1045406).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- Move nr_cpus_allowed into a hole in struct_sched_entity instead of the one below task_struct.policy. RT fills the hole 29baa7478ba4 used, which will screw up kABI for RT instead of curing the space needed problem in sched_rt_entity caused by adding ff77e4685359. This leaves nr_cpus_alowed in an odd spot, but safely allows the RT entity specific data added by ff77e4685359 to reside where it belongs.. nr_cpus_allowed just moves from one odd spot to another.
- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).
- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).
- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).
- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).
- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).
- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).
- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).
- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).
- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).
- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).
- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).
- net/mlx4_en: Change the error print to debug print (bsc#919382).
- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).
- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).
- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).
- net/mlx4_en: Wake TX queues only when there's enough room (bsc#1039258).
- net/mlx4: Fix the check in attaching steering rules (bsc#919382).
- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).
- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815 FATE#313898).
- nfs: Avoid getting confused by confused server (bsc#1045416).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).
- nfsd: Don't use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Fix another OPEN_DOWNGRADE bug (git-next).
- nfs: fix nfs_size_to_loff_t (git-fixes).
- nfs: Fix size of NFSACL SETACL operations (git-fixes).
- nfs: Make nfs_readdir revalidate less often (bsc#1048232).
- nfs: tidy up nfs_show_mountd_netid (git-fixes).
- nfsv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).
- nfsv4: Fix another bug in the close/open_downgrade code (git-fixes).
- nfsv4: fix getacl head length estimation (git-fixes).
- nfsv4: Fix problems with close in the presence of a delegation (git-fixes).
- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).
- ocfs2: Don't clear SGID when inheriting ACLs (bsc#1030552).
- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).
- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).
- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).
- ocfs2: null deref on allocation error (bsc#1013018).
- pci: Allow access to VPD attributes with size 0 (bsc#1018074).
- pciback: only check PF if actually dealing with a VF (bsc#999245).
- pciback: use pci_physfn() (bsc#999245).
- pci: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).
- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).
- perf/core: Fix event inheritance on fork() (bnc#1013018).
- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).
- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).
- powerpc: Drop support for pre-POWER4 cpus (fate#322495, bsc#1032471).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138,fate#319026).
- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (fate#322495, bsc#1032471).
- powerpc/mm/hash: Convert mask to unsigned long (fate#322495, bsc#1032471).
- powerpc/mm/hash: Increase VA range to 128TB (fate#322495, bsc#1032471).
- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (fate#322495, bsc#1032471).
- powerpc/mm/hash: Support 68 bit VA (fate#322495, bsc#1032471).
- powerpc/mm/hash: Use context ids 1-4 for the kernel (fate#322495, bsc#1032471).
- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (fate#322495, bsc#1032471).
- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (fate#322495, bsc#1032471).
- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (fate#322495, bsc#1032471).
- powerpc/mm/slice: Move slice_mask struct definition to slice.c (fate#322495, bsc#1032471).
- powerpc/mm/slice: Update slice mask printing to use bitmap printing (fate#322495, bsc#1032471).
- powerpc/mm/slice: Update the function prototype (fate#322495, bsc#1032471).
- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (fate#322495, bsc#1032471).
- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).
- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).
- powerpc: Remove STAB code (fate#322495, bsc#1032471).
- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).
- raid1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1026260).
- random32: fix off-by-one in seeding requirement (git-fixes).
- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).
- rcu: Direct algorithmic SRCU implementation (bsc#1008893).
- rcu: Flip ->completed only once per SRCU grace period (bsc#1008893).
- rcu: Implement a variant of Peter's SRCU algorithm (bsc#1008893).
- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).
- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).
- reiserfs: Don't clear SGID when inheriting ACLs (bsc#1030552).
- reiserfs: don't preallocate blocks for extended attributes (bsc#990682).
- Remove patches causing regression (bsc#1043234)
- Remove superfluous make flags (bsc#1012422)
- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).
- Revert 'kabi:severeties: Add splice_write_to_file PASS' This reverts commit 05ecf7ab16b2ea555fadd1ce17d8177394de88f2.
- Revert 'math64: New div64_u64_rem helper' (bnc#938352).
- Revert 'xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).' I was baing my assumption of SLE11-SP4 needing this patch on an old kernel build (3.0.101-63). Re-testing with the latest one 3.0.101-94 shows that the issue is not present. Furthermore this one was causing some crashes. This reverts commit 16ceeac70f7286b6232861c3170ed32e39dcc68c.
- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).
- s390/kmsg: add missing kmsg descriptions (bnc#1025702, LTC#151573).
- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).
- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).
- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).
- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702, LTC#152144).
- s390/zcrypt: Introduce CEX6 toleration (FATE#321782, LTC#147505).
- sched: Always initialize cpu-power (bnc#1013018).
- sched: Avoid cputime scaling overflow (bnc#938352).
- sched: Avoid prev->stime underflow (bnc#938352).
- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).
- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).
- sched/cputime: Do not scale when utime == 0 (bnc#938352).
- sched/debug: Print the scheduler topology group mask (bnc#1013018).
- sched: Do not account bogus utime (bnc#938352).
- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).
- sched/fair: Fix min_vruntime tracking (bnc#1013018).
- sched: Fix domain iteration (bnc#1013018).
- sched: Fix SD_OVERLAP (bnc#1013018).
- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).
- sched: Lower chances of cputime scaling overflow (bnc#938352).
- sched: Move nr_cpus_allowed out of 'struct sched_rt_entity' (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking
- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).
- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).
- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).
- sched/topology: Move comment about asymmetric node setups (bnc#1013018).
- sched/topology: Optimize build_group_mask() (bnc#1013018).
- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).
- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).
- sched/topology: Verify the first group matches the child domain (bnc#1013018).
- sched: Use swap() macro in scale_stime() (bnc#938352).
- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).
- scsi: fix race between simultaneous decrements of ->host_failed (bsc#1050154).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: mvsas: fix command_active typo (bsc#1050154).
- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).
- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).
- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702, LTC#151317).
- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702, LTC#151319).
- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702, LTC#151365).
- scsi: zfcp: fix use-after-'free' in FC ingress path after TMF (bnc#1025702, LTC#151312).
- sfc: do not device_attach if a reset is pending (bsc#909618 FATE#317521).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- splice: Stub splice_write_to_file (bsc#1043234).
- sunrpc: Clean up the slot table allocation (bsc#1013862).
- sunrpc: Fix a memory leak in the backchannel code (git-fixes).
- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).
- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).
- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).
- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).
- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).
- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).
- udf: Fix races with i_size changes during readpage (bsc#1013018).
- Update metadata for serial fixes (bsc#1013070)
- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).
- usb: cdc-acm: fix broken runtime suspend (bsc#1033771).
- usb: cdc-acm: fix open and suspend race (bsc#1033771).
- usb: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).
- usb: cdc-acm: fix runtime PM for control messages (bsc#1033771).
- usb: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).
- usb: cdc-acm: fix shutdown and suspend race (bsc#1033771).
- usb: cdc-acm: fix write and resume race (bsc#1033771).
- usb: cdc-acm: fix write and suspend race (bsc#1033771).
- usb: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).
- usb: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).
- usb: class: usbtmc: do not print on ENOMEM (bsc#1036288).
- usb: hub: Fix crash after failure to read BOS descriptor (FATE#317453).
- usb: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).
- usb: iowarrior: fix NULL-deref in write (bsc#1037359).
- usb: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).
- usb: serial: ark3116: fix register-accessor error handling (git-fixes).
- usb: serial: ch341: fix open error handling (bsc#1037441).
- usb: serial: cp210x: fix tiocmget error handling (bsc#1037441).
- usb: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).
- usb: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).
- usb: serial: io_ti: fix information leak in completion handler (git-fixes).
- usb: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).
- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).
- usb: serial: mos7720: fix NULL-deref at open (bsc#1033816).
- usb: serial: mos7720: fix parallel probe (bsc#1033816).
- usb: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).
- usb: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).
- usb: serial: mos7840: fix another NULL-deref at open (bsc#1034026).
- usb: serial: mos7840: fix NULL-deref at open (bsc#1034026).
- usb: serial: oti6858: fix NULL-deref at open (bsc#1037441).
- usb: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).
- usb: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).
- usbtmc: remove redundant braces (bsc#1036288).
- usbtmc: remove trailing spaces (bsc#1036288).
- usb: usbip: fix nonconforming hub descriptor (bsc#1047487).
- usb: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).
- usb: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).
- usb: usbtmc: add missing endpoint sanity check (bsc#1036288).
- usb: usbtmc: Change magic number to constant (bsc#1036288).
- usb: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).
- usb: usbtmc: fix DMA on stack (bsc#1036288).
- usb: usbtmc: fix probe error path (bsc#1036288).
- usb: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).
- usb: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).
- usb: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).
- usbvision: fix NULL-deref at probe (bsc#1050431).
- usb: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).
- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available. SLE11 has make 3.81 so it is required to include make 4 in the kernel OBS projects to take advantege of this.
- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).
- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).
- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).
- vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1050431).
- vfs: split generic splice code from i_mutex locking (bsc#1024788).
- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).
- vmxnet3: fix checks for dma mapping errors (bsc#1045356).
- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).
- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression >= 0 (bsc#1051478).
- xen: avoid deadlock in xenbus (bnc#1047523).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).
- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).
- xfrm: NULL dereference on allocation failure (bsc#1047343).
- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: Fix lock ordering in splice write (bsc#1024788).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: kill xfs_itruncate_start (bsc#1024788).
- xfs: Make xfs_icdinode->di_dmstate atomic_t (bsc#1024788).
- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).
- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).
- xfs: remove xfs_itruncate_data (bsc#1024788).
- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).
- xfs: split xfs_itruncate_finish (bsc#1024788).
- xfs: split xfs_setattr (bsc#1024788).
- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: use ->b_state to fix buffer I/O accounting release race (bsc#1041160).
- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).
Patchnames
slertesp4-kernel-rt-13262
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2014-9922: The eCryptfs subsystem in the Linux kernel allowed local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c (bsc#1032340).\n- CVE-2015-3288: mm/memory.c in the Linux kernel mishandled anonymous pages, which allowed local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero (bnc#979021).\n- CVE-2015-8970: crypto/algif_skcipher.c in the Linux kernel did not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allowed local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that did not supply a key, related to the lrw_crypt function in crypto/lrw.c (bnc#1008374 bsc#1008850).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).\n- CVE-2016-2188: The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#970956).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2016-5243: The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel did not properly copy a certain string, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#983212).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2017-1000363: A buffer overflow in kernel commandline handling of the \u0027lp\u0027 parameter could be used to bypass certain secure boot settings. (bnc#1039456).\n- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \u0027jumped\u0027 over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010) (bnc#1039348).\n- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation (bnc#1039354).\n- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).\n- CVE-2017-11176: The mq_notify function in the Linux kernel did not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allowed attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact (bnc#1048275).\n- CVE-2017-11473: Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel allowed local users to gain privileges via a crafted ACPI table (bsc#1049603).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565 bsc#1028372).\n- CVE-2017-2647: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c (bnc#1030593).\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).\n- CVE-2017-5669: The do_shmat function in ipc/shm.c in the Linux kernel did not restrict the address calculated by a certain rounding operation, which allowed local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context (bnc#1026914).\n- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024 bsc#1033287).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).\n- CVE-2017-6348: The hashbin_delete function in net/irda/irqueue.c in the Linux kernel improperly manages lock dropping, which allowed local users to cause a denial of service (deadlock) via crafted operations on IrDA devices (bnc#1027178).\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986 (bnc#1027066).\n- CVE-2017-6951: The keyring_search_aux function in security/keys/keyring.c in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \u0027dead\u0027 type (bnc#1029850).\n- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52 (bnc#1030573).\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls (bnc#1031579).\n- CVE-2017-7482: Fixed a potential overflow in the net/rxprc where a padded len isn\u0027t checked in ticket decode (bsc#1046107).\n- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).\n- CVE-2017-7533: Race condition in the fsnotify implementation in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions (bsc#1049483).\n- CVE-2017-7542: The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel allowed local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket (bsc#1049882).\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).\n- CVE-2017-8924: The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel allowed local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow (bnc#1037182 bsc#1038982).\n- CVE-2017-8925: The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel allowed local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling (bnc#1037183 bsc#1038981).\n- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).\n- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).\n- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).\n\nThe following non-security bugs were fixed:\n\n- 8250: use callbacks to access UART_DLL/UART_DLM.\n- acpi: Disable APEI error injection if securelevel is set (bsc#972891, bsc#1023051).\n- af_key: Add lock to key dump (bsc#1047653).\n- af_key: Fix slab-out-of-bounds in pfkey_compile_policy (bsc#1047354).\n- alsa: ctxfi: Fallback DMA mask to 32bit (bsc#1045538).\n- alsa: hda - Fix regression of HD-audio controller fallback modes (bsc#1045538).\n- alsa: hda/realtek - Correction of fixup codes for PB V7900 laptop (bsc#1045538).\n- alsa: hda/realtek - Fix COEF widget NID for ALC260 replacer fixup (bsc#1045538).\n- alsa: hda - using uninitialized data (bsc#1045538).\n- alsa: off by one bug in snd_riptide_joystick_probe() (bsc#1045538).\n- alsa: seq: Fix snd_seq_call_port_info_ioctl in compat mode (bsc#1045538).\n- ath9k: fix buffer overrun for ar9287 (bsc#1045538).\n- __bitmap_parselist: fix bug in empty string handling (bnc#1042633).\n- blacklist.conf: Add a few inapplicable items (bsc#1045538).\n- blacklist.conf: blacklisted 1fe89e1b6d27 (bnc#1046122)\n- block: do not allow updates through sysfs until registration completes (bsc#1047027).\n- block: fix ext_dev_lock lockdep report (bsc#1050154).\n- btrfs: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- cifs: backport prepath matching fix (bsc#799133).\n- cifs: don\u0027t compare uniqueids in cifs_prime_dcache unless server inode numbers are in use (bsc#1041975).\n- cifs: small underflow in cnvrtDosUnixTm() (bsc#1043935).\n- cifs: Timeout on SMBNegotiate request (bsc#1044913).\n- clocksource: Remove \u0027weak\u0027 from clocksource_default_clock() declaration (bnc#1013018).\n- cputime: Avoid multiplication overflow on utime scaling (bnc#938352).\n- crypto: nx - off by one bug in nx_of_update_msc() (fate#314588,bnc#792863).\n- decompress_bunzip2: off by one in get_next_block() (git-fixes).\n- devres: fix a for loop bounds check (git-fixes).\n- dlm: backport \u0027fix lvb invalidation conditions\u0027 (bsc#1005651).\n- dm: fix ioctl retry termination with signal (bsc#1050154).\n- drm/mgag200: Add support for G200eH3 (bnc#1044216, fate#323551)\n- drm/mgag200: Add support for G200e rev 4 (bnc#995542, comment #81)\n- edac, amd64_edac: Shift wrapping issue in f1x_get_norm_dct_addr() (fate#313937).\n- enic: set skb-\u003ehash type properly (bsc#911105 FATE#317501).\n- ext2: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- ext3: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- ext4: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- ext4: fix fdatasync(2) after extent manipulation operations (bsc#1013018).\n- ext4: fix mballoc breakage with 64k block size (bsc#1013018).\n- ext4: fix stack memory corruption with 64k block size (bsc#1013018).\n- ext4: keep existing extra fields when inode expands (bsc#1013018).\n- ext4: reject inodes with negative size (bsc#1013018).\n- fbdev/efifb: Fix 16 color palette entry calculation (bsc#1041762).\n- firmware: fix directory creation rule matching with make 3.80 (bsc#1012422).\n- firmware: fix directory creation rule matching with make 3.82 (bsc#1012422).\n- fixed invalid assignment of 64bit mask to host dma_boundary for scatter gather segment boundary limit (bsc#1042045).\n- Fix soft lockup in svc_rdma_send (bsc#1044854).\n- fnic: Return \u0027DID_IMM_RETRY\u0027 if rport is not ready (bsc#1035920).\n- fnic: Using rport-\u003edd_data to check rport online instead of rport_lookup (bsc#1035920).\n- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).\n- fs: fix data invalidation in the cleancache during direct IO (git-fixes).\n- fs/xattr.c: zero out memory copied to userspace in getxattr (bsc#1013018).\n- fuse: add missing FR_FORCE (bsc#1013018).\n- fuse: initialize fc-\u003erelease before calling it (bsc#1013018).\n- genirq: Prevent proc race against freeing of irq descriptors (bnc#1044230).\n- hrtimer: Allow concurrent hrtimer_start() for self restarting timers (bnc#1013018).\n- i40e: avoid null pointer dereference (bsc#909486 FATE#317393).\n- i40e: Fix TSO with more than 8 frags per segment issue (bsc#985561).\n- i40e/i40evf: Break up xmit_descriptor_count from maybe_stop_tx (bsc#985561).\n- i40e/i40evf: Fix mixed size frags and linearization (bsc#985561).\n- i40e/i40evf: Limit TSO to 7 descriptors for payload instead of 8 per packet (bsc#985561).\n- i40e/i40evf: Rewrite logic for 8 descriptor per packet check (bsc#985561).\n- i40e: Impose a lower limit on gso size (bsc#985561).\n- i40e: Limit TX descriptor count in cases where frag size is greater than 16K (bsc#985561).\n- ib/mlx4: Demote mcg message from warning to debug (bsc#919382).\n- ib/mlx4: Fix ib device initialization error flow (bsc#919382).\n- ib/mlx4: Fix port query for 56Gb Ethernet links (bsc#919382).\n- ib/mlx4: Handle well-known-gid in mad_demux processing (bsc#919382).\n- ib/mlx4: Reduce SRIOV multicast cleanup warning message to debug level (bsc#919382).\n- ib/mlx4: Set traffic class in AH (bsc#919382).\n- Implement an ioctl to support the USMTMC-USB488 READ_STATUS_BYTE operation (bsc#1036288).\n- initial cr0 bits (bnc#1036056, LTC#153612).\n- input: cm109 - validate number of endpoints before using them (bsc#1037193).\n- input: hanwang - validate number of endpoints before using them (bsc#1037232).\n- input: yealink - validate number of endpoints before using them (bsc#1037227).\n- ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route (git-fixes).\n- irq: Fix race condition (bsc#1042615).\n- isdn/gigaset: fix NULL-deref at probe (bsc#1037356).\n- isofs: Do not return EACCES for unknown filesystems (bsc#1013018).\n- jbd: do not wait (forever) for stale tid caused by wraparound (bsc#1020229).\n- jbd: Fix oops in journal_remove_journal_head() (bsc#1017143).\n- jsm: add support for additional Neo cards (bsc#1045615).\n- kabi fix (bsc#1008893).\n- kABI: mask struct xfs_icdinode change (bsc#1024788).\n- kabi: Protect xfs_mount and xfs_buftarg (bsc#1024508).\n- kabi:severeties: Add splice_write_to_file PASS This function is part of an xfs-specific fix which never went upstream and is not expected to have 3rdparty users other than xfs itself.\n- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)\n- keys: Disallow keyrings beginning with \u0027.\u0027 to be joined as session keyrings (bnc#1035576).\n- kvm: kvm_io_bus_unregister_dev() should never fail.\n- libata: fix sff host state machine locking while polling (bsc#1045525).\n- libceph: NULL deref on crush_decode() error path (bsc#1044015).\n- libceph: potential NULL dereference in ceph_msg_data_create() (bsc#1051515).\n- libfc: fixup locking in fc_disc_stop() (bsc#1029140).\n- libfc: move \u0027pending\u0027 and \u0027requested\u0027 setting (bsc#1029140).\n- libfc: only restart discovery after timeout if not already running (bsc#1029140).\n- lockd: use init_utsname for id encoding (bsc#1033804).\n- lockd: use rpc client\u0027s cl_nodename for id encoding (bsc#1033804).\n- locking/rtmutex: Prevent dequeue vs. unlock race (bnc#1013018).\n- math64: New div64_u64_rem helper (bnc#938352).\n- md: ensure md devices are freed before module is unloaded (git-fixes).\n- md: fix a null dereference (bsc#1040351).\n- md: flush -\u003eevent_work before stopping array (git-fixes).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- md/linear: shutup lockdep warnning (bsc#1018446).\n- md: make sure GET_ARRAY_INFO ioctl reports correct \u0027clean\u0027 status (git-fixes).\n- md/raid0: apply base queue limits *before* disk_stack_limits (git-fixes).\n- md/raid1: extend spinlock to protect raid1_end_read_request against inconsistencies (git-fixes).\n- md/raid1: fix test for \u0027was read error from last working device\u0027 (git-fixes).\n- md/raid5: do not record new size if resize_stripes fails (git-fixes).\n- md/raid5: Fix CPU hotplug callback registration (git-fixes).\n- md: use separate bio_pool for metadata writes (bsc#1040351).\n- megaraid_sas: add missing curly braces in ioctl handler (bsc#1050154).\n- mlx4: reduce OOM risk on arches with large pages (bsc#919382).\n- mmc: core: add missing pm event in mmc_pm_notify to fix hib restore (bsc#1045547).\n- mmc: ushc: fix NULL-deref at probe (bsc#1037191).\n- mm: do not collapse stack gap into THP (bnc#1039348)\n- mm: enlarge stack guard gap (bnc#1039348).\n- mm/huge_memory: replace VM_NO_THP VM_BUG_ON with actual VMA check (VM Functionality, bsc#1042832).\n- mm: hugetlb: call huge_pte_alloc() only if ptep is null (VM Functionality, bsc#1042832).\n- mm/memory-failure.c: use compound_head() flags for huge pages (bnc#971975 VM -- git fixes).\n- mm/mempolicy.c: do not put mempolicy before using its nodemask (References: VM Performance, bnc#931620).\n- mm, mmap: do not blow on PROT_NONE MAP_FIXED holes in the stack (bnc#1039348, bnc#1045340, bnc#1045406).\n- module: fix memory leak on early load_module() failures (bsc#1043014).\n- Move nr_cpus_allowed into a hole in struct_sched_entity instead of the one below task_struct.policy. RT fills the hole 29baa7478ba4 used, which will screw up kABI for RT instead of curing the space needed problem in sched_rt_entity caused by adding ff77e4685359. This leaves nr_cpus_alowed in an odd spot, but safely allows the RT entity specific data added by ff77e4685359 to reside where it belongs.. nr_cpus_allowed just moves from one odd spot to another.\n- mwifiex: printk() overflow with 32-byte SSIDs (bsc#1048185).\n- net: avoid reference counter overflows on fib_rules in multicast forwarding (git-fixes).\n- net: ip6mr: fix static mfc/dev leaks on table destruction (git-fixes).\n- net: ipmr: fix static mfc/dev leaks on table destruction (git-fixes).\n- net/mlx4_core: Eliminate warning messages for SRQ_LIMIT under SRIOV (bsc#919382).\n- net/mlx4_core: Enhance the MAD_IFC wrapper to convert VF port to physical (bsc#919382).\n- net/mlx4_core: Fix VF overwrite of module param which disables DMFS on new probed PFs (bsc#919382).\n- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#919382).\n- net/mlx4_core: Get num_tc using netdev_get_num_tc (bsc#919382).\n- net/mlx4_core: Prevent VF from changing port configuration (bsc#919382).\n- net/mlx4_core: Use-after-free causes a resource leak in flow-steering detach (bsc#919382).\n- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#919382).\n- net/mlx4_en: Avoid adding steering rules with invalid ring (bsc#919382).\n- net/mlx4_en: Change the error print to debug print (bsc#919382).\n- net/mlx4_en: fix overflow in mlx4_en_init_timestamp() (bsc#919382).\n- net/mlx4_en: Fix type mismatch for 32-bit systems (bsc#919382).\n- net/mlx4_en: Resolve dividing by zero in 32-bit system (bsc#919382).\n- net/mlx4_en: Wake TX queues only when there\u0027s enough room (bsc#1039258).\n- net/mlx4: Fix the check in attaching steering rules (bsc#919382).\n- net/mlx4: Fix uninitialized fields in rule when adding promiscuous mode to device managed flow steering (bsc#919382).\n- net: wimax/i2400m: fix NULL-deref at probe (bsc#1037358).\n- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bnc#784815 FATE#313898).\n- nfs: Avoid getting confused by confused server (bsc#1045416).\n- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).\n- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).\n- nfsd: do not risk using duplicate owner/file/delegation ids (bsc#1029212).\n- nfsd: Don\u0027t use state id of 0 - it is reserved (bsc#1049688 bsc#1051770).\n- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).\n- nfs: Fix another OPEN_DOWNGRADE bug (git-next).\n- nfs: fix nfs_size_to_loff_t (git-fixes).\n- nfs: Fix size of NFSACL SETACL operations (git-fixes).\n- nfs: Make nfs_readdir revalidate less often (bsc#1048232).\n- nfs: tidy up nfs_show_mountd_netid (git-fixes).\n- nfsv4: Do not call put_rpccred() under the rcu_read_lock() (git-fixes).\n- nfsv4: Fix another bug in the close/open_downgrade code (git-fixes).\n- nfsv4: fix getacl head length estimation (git-fixes).\n- nfsv4: Fix problems with close in the presence of a delegation (git-fixes).\n- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).\n- ocfs2: do not write error flag to user structure we cannot copy from/to (bsc#1013018).\n- ocfs2: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- ocfs2: fix crash caused by stale lvb with fsdlm plugin (bsc#1013800).\n- ocfs2: fix error return code in ocfs2_info_handle_freefrag() (bsc#1013018).\n- ocfs2: NFS hangs in __ocfs2_cluster_lock due to race with ocfs2_unblock_lock (bsc#962257).\n- ocfs2: null deref on allocation error (bsc#1013018).\n- pci: Allow access to VPD attributes with size 0 (bsc#1018074).\n- pciback: only check PF if actually dealing with a VF (bsc#999245).\n- pciback: use pci_physfn() (bsc#999245).\n- pci: Fix devfn for VPD access through function 0 (bnc#943786 git-fixes).\n- perf/core: Correct event creation with PERF_FORMAT_GROUP (bnc#1013018).\n- perf/core: Fix event inheritance on fork() (bnc#1013018).\n- posix-timers: Fix stack info leak in timer_create() (bnc#1013018).\n- powerpc,cpuidle: Dont toggle CPUIDLE_FLAG_IGNORE while setting smt_snooze_delay (bsc#1023163).\n- powerpc: Drop support for pre-POWER4 cpus (fate#322495, bsc#1032471).\n- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).\n- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).\n- powerpc/fadump: Update fadump documentation (bsc#1032141).\n- powerpc/mm: Do not alias user region to other regions below PAGE_OFFSET (bsc#928138,fate#319026).\n- powerpc/mm/hash: Check for non-kernel address in get_kernel_vsid() (fate#322495, bsc#1032471).\n- powerpc/mm/hash: Convert mask to unsigned long (fate#322495, bsc#1032471).\n- powerpc/mm/hash: Increase VA range to 128TB (fate#322495, bsc#1032471).\n- powerpc/mm/hash: Properly mask the ESID bits when building proto VSID (fate#322495, bsc#1032471).\n- powerpc/mm/hash: Support 68 bit VA (fate#322495, bsc#1032471).\n- powerpc/mm/hash: Use context ids 1-4 for the kernel (fate#322495, bsc#1032471).\n- powerpc/mm: Remove checks that TASK_SIZE_USER64 is too small (fate#322495, bsc#1032471).\n- powerpc/mm/slice: Convert slice_mask high slice to a bitmap (fate#322495, bsc#1032471).\n- powerpc/mm/slice: Fix off-by-1 error when computing slice mask (fate#322495, bsc#1032471).\n- powerpc/mm/slice: Move slice_mask struct definition to slice.c (fate#322495, bsc#1032471).\n- powerpc/mm/slice: Update slice mask printing to use bitmap printing (fate#322495, bsc#1032471).\n- powerpc/mm/slice: Update the function prototype (fate#322495, bsc#1032471).\n- powerpc/mm: use macro PGTABLE_EADDR_SIZE instead of digital (fate#322495, bsc#1032471).\n- powerpc/nvram: Fix an incorrect partition merge (bsc#1016489).\n- powerpc/pseries: Release DRC when configure_connector fails (bsc#1035777, Pending Base Kernel Fixes).\n- powerpc: Remove STAB code (fate#322495, bsc#1032471).\n- powerpc/vdso64: Use double word compare on pointers (bsc#1016489).\n- raid1: avoid unnecessary spin locks in I/O barrier code (bsc#982783,bsc#1026260).\n- random32: fix off-by-one in seeding requirement (git-fixes).\n- rcu: Call out dangers of expedited RCU primitives (bsc#1008893).\n- rcu: Direct algorithmic SRCU implementation (bsc#1008893).\n- rcu: Flip -\u003ecompleted only once per SRCU grace period (bsc#1008893).\n- rcu: Implement a variant of Peter\u0027s SRCU algorithm (bsc#1008893).\n- rcu: Increment upper bit only for srcu_read_lock() (bsc#1008893).\n- rcu: Remove fast check path from __synchronize_srcu() (bsc#1008893).\n- reiserfs: Don\u0027t clear SGID when inheriting ACLs (bsc#1030552).\n- reiserfs: don\u0027t preallocate blocks for extended attributes (bsc#990682).\n- Remove patches causing regression (bsc#1043234)\n- Remove superfluous make flags (bsc#1012422)\n- Return short read or 0 at end of a raw device, not EIO (bsc#1039594).\n- Revert \u0027kabi:severeties: Add splice_write_to_file PASS\u0027 This reverts commit 05ecf7ab16b2ea555fadd1ce17d8177394de88f2.\n- Revert \u0027math64: New div64_u64_rem helper\u0027 (bnc#938352).\n- Revert \u0027xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\u0027 I was baing my assumption of SLE11-SP4 needing this patch on an old kernel build (3.0.101-63). Re-testing with the latest one 3.0.101-94 shows that the issue is not present. Furthermore this one was causing some crashes. This reverts commit 16ceeac70f7286b6232861c3170ed32e39dcc68c.\n- rfkill: fix rfkill_fop_read wait_event usage (bsc#1046192).\n- s390/kmsg: add missing kmsg descriptions (bnc#1025702, LTC#151573).\n- s390/qdio: clear DSCI prior to scanning multiple input queues (bnc#1046715, LTC#156234).\n- s390/qeth: no ETH header for outbound AF_IUCV (bnc#1046715, LTC#156276).\n- s390/qeth: size calculation outbound buffers (bnc#1046715, LTC#156276).\n- s390/vmlogrdr: fix IUCV buffer allocation (bnc#1025702, LTC#152144).\n- s390/zcrypt: Introduce CEX6 toleration (FATE#321782, LTC#147505).\n- sched: Always initialize cpu-power (bnc#1013018).\n- sched: Avoid cputime scaling overflow (bnc#938352).\n- sched: Avoid prev-\u003estime underflow (bnc#938352).\n- sched/core: Fix TASK_DEAD race in finish_task_switch() (bnc#1013018).\n- sched/core: Remove false-positive warning from wake_up_process() (bnc#1044882).\n- sched/cputime: Do not scale when utime == 0 (bnc#938352).\n- sched/debug: Print the scheduler topology group mask (bnc#1013018).\n- sched: Do not account bogus utime (bnc#938352).\n- sched/fair, cpumask: Export for_each_cpu_wrap() (bnc#1013018).\n- sched/fair: Fix min_vruntime tracking (bnc#1013018).\n- sched: Fix domain iteration (bnc#1013018).\n- sched: Fix SD_OVERLAP (bnc#1013018).\n- sched/loadavg: Fix loadavg artifacts on fully idle and on fully loaded systems (bnc#1013018).\n- sched: Lower chances of cputime scaling overflow (bnc#938352).\n- sched: Move nr_cpus_allowed out of \u0027struct sched_rt_entity\u0027 (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking\n- sched: Rename a misleading variable in build_overlap_sched_groups() (bnc#1013018).\n- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1013018). Prep for b60205c7c558 sched/fair: Fix min_vruntime tracking\n- sched/topology: Fix building of overlapping sched-groups (bnc#1013018).\n- sched/topology: Fix overlapping sched_group_capacity (bnc#1013018).\n- sched/topology: Fix overlapping sched_group_mask (bnc#1013018).\n- sched/topology: Move comment about asymmetric node setups (bnc#1013018).\n- sched/topology: Optimize build_group_mask() (bnc#1013018).\n- sched/topology: Refactor function build_overlap_sched_groups() (bnc#1013018).\n- sched/topology: Remove FORCE_SD_OVERLAP (bnc#1013018).\n- sched/topology: Simplify build_overlap_sched_groups() (bnc#1013018).\n- sched/topology: Verify the first group matches the child domain (bnc#1013018).\n- sched: Use swap() macro in scale_stime() (bnc#938352).\n- scsi: bnx2i: missing error code in bnx2i_ep_connect() (bsc#1048221).\n- scsi: fix race between simultaneous decrements of -\u003ehost_failed (bsc#1050154).\n- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).\n- scsi: mvsas: fix command_active typo (bsc#1050154).\n- scsi: qla2xxx: Fix scsi scan hang triggered if adapter fails during init (bsc#1050154).\n- scsi: virtio_scsi: fix memory leak on full queue condition (bsc#1028880).\n- scsi: zfcp: do not trace pure benign residual HBA responses at default level (bnc#1025702, LTC#151317).\n- scsi: zfcp: fix rport unblock race with LUN recovery (bnc#1025702, LTC#151319).\n- scsi: zfcp: fix use-after-free by not tracing WKA port open/close on failed send (bnc#1025702, LTC#151365).\n- scsi: zfcp: fix use-after-\u0027free\u0027 in FC ingress path after TMF (bnc#1025702, LTC#151312).\n- sfc: do not device_attach if a reset is pending (bsc#909618 FATE#317521).\n- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).\n- smsc75xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).\n- splice: Stub splice_write_to_file (bsc#1043234).\n- sunrpc: Clean up the slot table allocation (bsc#1013862).\n- sunrpc: Fix a memory leak in the backchannel code (git-fixes).\n- sunrpc: Initalise the struct xprt upon allocation (bsc#1013862).\n- svcrdma: Fix send_reply() scatter/gather set-up (git-fixes).\n- target/iscsi: Fix double free in lio_target_tiqn_addtpg() (bsc#1050154).\n- tcp: abort orphan sockets stalling on zero window probes (bsc#1021913).\n- tracing: Fix syscall_*regfunc() vs copy_process() race (bnc#1042687).\n- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1013018).\n- udf: Fix deadlock between writeback and udf_setsize() (bsc#1013018).\n- udf: Fix races with i_size changes during readpage (bsc#1013018).\n- Update metadata for serial fixes (bsc#1013070)\n- Update patches.fixes/nfs-svc-rdma.fix (bsc#1044854).\n- usb: cdc-acm: fix broken runtime suspend (bsc#1033771).\n- usb: cdc-acm: fix open and suspend race (bsc#1033771).\n- usb: cdc-acm: fix potential urb leak and PM imbalance in write (bsc#1033771).\n- usb: cdc-acm: fix runtime PM for control messages (bsc#1033771).\n- usb: cdc-acm: fix runtime PM imbalance at shutdown (bsc#1033771).\n- usb: cdc-acm: fix shutdown and suspend race (bsc#1033771).\n- usb: cdc-acm: fix write and resume race (bsc#1033771).\n- usb: cdc-acm: fix write and suspend race (bsc#1033771).\n- usb: class: usbtmc.c: Cleaning up uninitialized variables (bsc#1036288).\n- usb: class: usbtmc: do not print error when allocating urb fails (bsc#1036288).\n- usb: class: usbtmc: do not print on ENOMEM (bsc#1036288).\n- usb: hub: Fix crash after failure to read BOS descriptor (FATE#317453).\n- usb: iowarrior: fix info ioctl on big-endian hosts (bsc#1037441).\n- usb: iowarrior: fix NULL-deref in write (bsc#1037359).\n- usb: r8a66597-hcd: select a different endpoint on timeout (bsc#1047053).\n- usb: serial: ark3116: fix register-accessor error handling (git-fixes).\n- usb: serial: ch341: fix open error handling (bsc#1037441).\n- usb: serial: cp210x: fix tiocmget error handling (bsc#1037441).\n- usb: serial: ftdi_sio: fix line-status over-reporting (bsc#1037441).\n- usb: serial: io_edgeport: fix epic-descriptor handling (bsc#1037441).\n- usb: serial: io_ti: fix information leak in completion handler (git-fixes).\n- usb: serial: iuu_phoenix: fix NULL-deref at open (bsc#1033794).\n- usb: serial: kl5kusb105: fix line-state error handling (bsc#1021256).\n- usb: serial: mos7720: fix NULL-deref at open (bsc#1033816).\n- usb: serial: mos7720: fix parallel probe (bsc#1033816).\n- usb: serial: mos7720: fix parport use-after-free on probe errors (bsc#1033816).\n- usb: serial: mos7720: fix use-after-free on probe errors (bsc#1033816).\n- usb: serial: mos7840: fix another NULL-deref at open (bsc#1034026).\n- usb: serial: mos7840: fix NULL-deref at open (bsc#1034026).\n- usb: serial: oti6858: fix NULL-deref at open (bsc#1037441).\n- usb: serial: sierra: fix bogus alternate-setting assumption (bsc#1037441).\n- usb: serial: spcp8x5: fix NULL-deref at open (bsc#1037441).\n- usbtmc: remove redundant braces (bsc#1036288).\n- usbtmc: remove trailing spaces (bsc#1036288).\n- usb: usbip: fix nonconforming hub descriptor (bsc#1047487).\n- usb: usbtmc: add device quirk for Rigol DS6104 (bsc#1036288).\n- usb: usbtmc: Add flag rigol_quirk to usbtmc_device_data (bsc#1036288).\n- usb: usbtmc: add missing endpoint sanity check (bsc#1036288).\n- usb: usbtmc: Change magic number to constant (bsc#1036288).\n- usb: usbtmc: fix big-endian probe of Rigol devices (bsc#1036288).\n- usb: usbtmc: fix DMA on stack (bsc#1036288).\n- usb: usbtmc: fix probe error path (bsc#1036288).\n- usb: usbtmc: Set rigol_quirk if device is listed (bsc#1036288).\n- usb: usbtmc: TMC request code segregated from usbtmc_read (bsc#1036288).\n- usb: usbtmc: usbtmc_read sends multiple TMC header based on rigol_quirk (bsc#1036288).\n- usbvision: fix NULL-deref at probe (bsc#1050431).\n- usb: xhci-mem: use passed in GFP flags instead of GFP_KERNEL (bsc#1023014).\n- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available. SLE11 has make 3.81 so it is required to include make 4 in the kernel OBS projects to take advantege of this.\n- Use PF_LESS_THROTTLE in loop device thread (bsc#1027101).\n- uwb: hwa-rc: fix NULL-deref at probe (bsc#1037233).\n- uwb: i1480-dfu: fix NULL-deref at probe (bsc#1036629).\n- vb2: Fix an off by one error in \u0027vb2_plane_vaddr\u0027 (bsc#1050431).\n- vfs: split generic splice code from i_mutex locking (bsc#1024788).\n- vmxnet3: avoid calling pskb_may_pull with interrupts disabled (bsc#1045356).\n- vmxnet3: fix checks for dma mapping errors (bsc#1045356).\n- vmxnet3: fix lock imbalance in vmxnet3_tq_xmit() (bsc#1045356).\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065, bsc#1029770).\n- x86, mm, paravirt: Fix vmalloc_fault oops during lazy MMU updates (bsc#948562).\n- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression \u003e= 0 (bsc#1051478).\n- xen: avoid deadlock in xenbus (bnc#1047523).\n- xen-blkfront: correct maximum segment accounting (bsc#1018263).\n- xen-blkfront: do not call talk_to_blkback when already connected to blkback.\n- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.\n- xen/PCI-MSI: fix sysfs teardown in DomU (bsc#986924).\n- xfrm: dst_entries_init() per-net dst_ops (bsc#1030814).\n- xfrm: NULL dereference on allocation failure (bsc#1047343).\n- xfrm: Oops on error in pfkey_msg2xfrm_state() (bsc#1047653).\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1024508).\n- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n- xfs: Fix lock ordering in splice write (bsc#1024788).\n- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\n- xfs: kill xfs_itruncate_start (bsc#1024788).\n- xfs: Make xfs_icdinode-\u003edi_dmstate atomic_t (bsc#1024788).\n- xfs: remove the i_new_size field in struct xfs_inode (bsc#1024788).\n- xfs: remove the i_size field in struct xfs_inode (bsc#1024788).\n- xfs: remove xfs_itruncate_data (bsc#1024788).\n- xfs: replace global xfslogd wq with per-mount wq (bsc#1024508).\n- xfs: split xfs_itruncate_finish (bsc#1024788).\n- xfs: split xfs_setattr (bsc#1024788).\n- xfs: Synchronize xfs_buf disposal routines (bsc#1041160).\n- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).\n- xfs: use -\u003eb_state to fix buffer I/O accounting release race (bsc#1041160).\n- xprtrdma: Free the pd if ib_query_qp() fails (git-fixes).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-rt-13262", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2342-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:2342-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172342-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:2342-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-September/003182.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1005651", "url": "https://bugzilla.suse.com/1005651" }, { "category": "self", "summary": "SUSE Bug 1008374", "url": "https://bugzilla.suse.com/1008374" }, { "category": "self", "summary": "SUSE Bug 1008850", "url": "https://bugzilla.suse.com/1008850" }, { "category": "self", "summary": "SUSE Bug 1008893", "url": "https://bugzilla.suse.com/1008893" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1013018", "url": "https://bugzilla.suse.com/1013018" }, { "category": "self", "summary": "SUSE Bug 1013070", "url": "https://bugzilla.suse.com/1013070" }, { "category": "self", "summary": "SUSE Bug 1013800", "url": "https://bugzilla.suse.com/1013800" }, { "category": "self", "summary": "SUSE Bug 1013862", "url": "https://bugzilla.suse.com/1013862" }, { "category": "self", "summary": "SUSE Bug 1016489", "url": "https://bugzilla.suse.com/1016489" }, { "category": "self", "summary": "SUSE Bug 1017143", "url": "https://bugzilla.suse.com/1017143" }, { "category": "self", "summary": "SUSE Bug 1018074", "url": "https://bugzilla.suse.com/1018074" }, { "category": "self", "summary": "SUSE Bug 1018263", "url": "https://bugzilla.suse.com/1018263" }, { "category": "self", "summary": "SUSE Bug 1018446", "url": "https://bugzilla.suse.com/1018446" }, { "category": "self", "summary": "SUSE Bug 1019168", "url": "https://bugzilla.suse.com/1019168" }, { "category": "self", "summary": "SUSE Bug 1020229", "url": "https://bugzilla.suse.com/1020229" }, { "category": "self", "summary": "SUSE Bug 1021256", "url": "https://bugzilla.suse.com/1021256" }, { "category": "self", "summary": "SUSE Bug 1021913", "url": "https://bugzilla.suse.com/1021913" }, { "category": "self", "summary": "SUSE Bug 1022971", "url": "https://bugzilla.suse.com/1022971" }, { "category": "self", "summary": "SUSE Bug 1023014", "url": "https://bugzilla.suse.com/1023014" }, { "category": "self", "summary": "SUSE Bug 1023051", "url": "https://bugzilla.suse.com/1023051" }, { "category": "self", "summary": "SUSE Bug 1023163", "url": "https://bugzilla.suse.com/1023163" }, { "category": "self", "summary": "SUSE Bug 1023888", "url": "https://bugzilla.suse.com/1023888" }, { "category": "self", "summary": "SUSE Bug 1024508", "url": "https://bugzilla.suse.com/1024508" }, { "category": "self", "summary": "SUSE Bug 1024788", "url": "https://bugzilla.suse.com/1024788" }, { "category": "self", "summary": "SUSE Bug 1024938", "url": "https://bugzilla.suse.com/1024938" }, { "category": "self", "summary": "SUSE Bug 1025235", "url": "https://bugzilla.suse.com/1025235" }, { "category": "self", "summary": "SUSE Bug 1025702", "url": "https://bugzilla.suse.com/1025702" }, { "category": "self", "summary": "SUSE Bug 1026024", "url": "https://bugzilla.suse.com/1026024" }, { "category": "self", "summary": "SUSE Bug 1026260", "url": "https://bugzilla.suse.com/1026260" }, { "category": "self", "summary": "SUSE Bug 1026722", "url": "https://bugzilla.suse.com/1026722" }, { "category": "self", "summary": "SUSE Bug 1026914", "url": "https://bugzilla.suse.com/1026914" }, { "category": "self", "summary": "SUSE Bug 1027066", "url": "https://bugzilla.suse.com/1027066" }, { "category": "self", "summary": "SUSE Bug 1027101", "url": "https://bugzilla.suse.com/1027101" }, { "category": "self", "summary": "SUSE Bug 1027178", "url": "https://bugzilla.suse.com/1027178" }, { "category": "self", "summary": "SUSE Bug 1027565", "url": "https://bugzilla.suse.com/1027565" }, { "category": "self", "summary": "SUSE Bug 1028372", "url": "https://bugzilla.suse.com/1028372" }, { "category": "self", "summary": "SUSE Bug 1028415", "url": "https://bugzilla.suse.com/1028415" }, { "category": "self", "summary": "SUSE Bug 1028880", "url": "https://bugzilla.suse.com/1028880" }, { "category": "self", "summary": "SUSE Bug 1029140", "url": "https://bugzilla.suse.com/1029140" }, { "category": "self", "summary": "SUSE Bug 1029212", "url": "https://bugzilla.suse.com/1029212" }, { "category": "self", "summary": "SUSE Bug 1029770", "url": "https://bugzilla.suse.com/1029770" }, { "category": "self", "summary": "SUSE Bug 1029850", "url": "https://bugzilla.suse.com/1029850" }, { "category": "self", "summary": "SUSE Bug 1030213", "url": "https://bugzilla.suse.com/1030213" }, { "category": "self", "summary": "SUSE Bug 1030552", "url": "https://bugzilla.suse.com/1030552" }, { "category": "self", "summary": "SUSE Bug 1030573", "url": "https://bugzilla.suse.com/1030573" }, { "category": "self", "summary": "SUSE Bug 1030593", "url": "https://bugzilla.suse.com/1030593" }, { "category": "self", "summary": "SUSE Bug 1030814", "url": "https://bugzilla.suse.com/1030814" }, { "category": "self", "summary": "SUSE Bug 1031003", "url": "https://bugzilla.suse.com/1031003" }, { "category": "self", "summary": "SUSE Bug 1031052", "url": "https://bugzilla.suse.com/1031052" }, { "category": "self", "summary": "SUSE Bug 1031440", "url": "https://bugzilla.suse.com/1031440" }, { "category": "self", "summary": "SUSE Bug 1031579", "url": "https://bugzilla.suse.com/1031579" }, { "category": "self", "summary": "SUSE Bug 1032141", "url": "https://bugzilla.suse.com/1032141" }, { "category": "self", "summary": "SUSE Bug 1032340", "url": "https://bugzilla.suse.com/1032340" }, { "category": "self", "summary": "SUSE Bug 1032471", "url": "https://bugzilla.suse.com/1032471" }, { "category": "self", "summary": "SUSE Bug 1033287", "url": "https://bugzilla.suse.com/1033287" }, { "category": "self", "summary": "SUSE Bug 1033336", "url": "https://bugzilla.suse.com/1033336" }, { "category": "self", "summary": "SUSE Bug 1033771", "url": "https://bugzilla.suse.com/1033771" }, { "category": "self", "summary": "SUSE Bug 1033794", "url": "https://bugzilla.suse.com/1033794" }, { "category": "self", "summary": "SUSE Bug 1033804", "url": "https://bugzilla.suse.com/1033804" }, { "category": "self", "summary": "SUSE Bug 1033816", "url": "https://bugzilla.suse.com/1033816" }, { "category": "self", "summary": "SUSE Bug 1034026", "url": "https://bugzilla.suse.com/1034026" }, { "category": "self", "summary": "SUSE Bug 1034670", "url": "https://bugzilla.suse.com/1034670" }, { "category": "self", "summary": "SUSE Bug 1035576", "url": "https://bugzilla.suse.com/1035576" }, { "category": "self", "summary": "SUSE Bug 1035777", "url": "https://bugzilla.suse.com/1035777" }, { "category": "self", "summary": "SUSE Bug 1035920", "url": "https://bugzilla.suse.com/1035920" }, { "category": "self", "summary": "SUSE Bug 1036056", "url": "https://bugzilla.suse.com/1036056" }, { "category": "self", "summary": "SUSE Bug 1036288", "url": "https://bugzilla.suse.com/1036288" }, { "category": "self", "summary": "SUSE Bug 1036629", "url": "https://bugzilla.suse.com/1036629" }, { "category": "self", "summary": "SUSE Bug 1037182", "url": "https://bugzilla.suse.com/1037182" }, { "category": "self", "summary": "SUSE Bug 1037183", "url": "https://bugzilla.suse.com/1037183" }, { "category": "self", "summary": "SUSE Bug 1037191", "url": "https://bugzilla.suse.com/1037191" }, { "category": "self", "summary": "SUSE Bug 1037193", "url": "https://bugzilla.suse.com/1037193" }, { "category": "self", "summary": "SUSE Bug 1037227", "url": "https://bugzilla.suse.com/1037227" }, { "category": "self", "summary": "SUSE Bug 1037232", "url": "https://bugzilla.suse.com/1037232" }, { "category": "self", "summary": "SUSE Bug 1037233", "url": "https://bugzilla.suse.com/1037233" }, { "category": "self", "summary": "SUSE Bug 1037356", "url": "https://bugzilla.suse.com/1037356" }, { "category": "self", "summary": "SUSE Bug 1037358", "url": "https://bugzilla.suse.com/1037358" }, { "category": "self", "summary": "SUSE Bug 1037359", "url": "https://bugzilla.suse.com/1037359" }, { "category": "self", "summary": "SUSE Bug 1037441", "url": "https://bugzilla.suse.com/1037441" }, { "category": "self", "summary": "SUSE Bug 1038544", "url": "https://bugzilla.suse.com/1038544" }, { "category": "self", "summary": "SUSE Bug 1038879", "url": "https://bugzilla.suse.com/1038879" }, { "category": "self", "summary": "SUSE Bug 1038981", "url": "https://bugzilla.suse.com/1038981" }, { "category": "self", "summary": "SUSE Bug 1038982", "url": "https://bugzilla.suse.com/1038982" }, { "category": "self", "summary": "SUSE Bug 1039258", "url": "https://bugzilla.suse.com/1039258" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1039354", "url": "https://bugzilla.suse.com/1039354" }, { "category": "self", "summary": "SUSE Bug 1039456", "url": "https://bugzilla.suse.com/1039456" }, { "category": "self", "summary": "SUSE Bug 1039594", "url": "https://bugzilla.suse.com/1039594" }, { "category": "self", "summary": "SUSE Bug 1039882", "url": "https://bugzilla.suse.com/1039882" }, { "category": "self", "summary": "SUSE Bug 1039883", "url": "https://bugzilla.suse.com/1039883" }, { "category": "self", "summary": "SUSE Bug 1039885", "url": "https://bugzilla.suse.com/1039885" }, { "category": "self", "summary": "SUSE Bug 1040069", "url": "https://bugzilla.suse.com/1040069" }, { "category": "self", "summary": "SUSE Bug 1040351", "url": "https://bugzilla.suse.com/1040351" }, { "category": "self", "summary": "SUSE Bug 1041160", "url": "https://bugzilla.suse.com/1041160" }, { "category": "self", "summary": "SUSE Bug 1041431", "url": "https://bugzilla.suse.com/1041431" }, { "category": "self", "summary": "SUSE Bug 1041762", "url": "https://bugzilla.suse.com/1041762" }, { "category": "self", "summary": "SUSE Bug 1041975", "url": "https://bugzilla.suse.com/1041975" }, { "category": "self", "summary": "SUSE Bug 1042045", "url": "https://bugzilla.suse.com/1042045" }, { "category": "self", "summary": "SUSE Bug 1042200", "url": "https://bugzilla.suse.com/1042200" }, { "category": "self", "summary": "SUSE Bug 1042615", "url": "https://bugzilla.suse.com/1042615" }, { "category": "self", "summary": "SUSE Bug 1042633", "url": "https://bugzilla.suse.com/1042633" }, { "category": "self", "summary": "SUSE Bug 1042687", "url": "https://bugzilla.suse.com/1042687" }, { "category": "self", "summary": "SUSE Bug 1042832", "url": "https://bugzilla.suse.com/1042832" }, { "category": "self", "summary": "SUSE Bug 1043014", "url": "https://bugzilla.suse.com/1043014" }, { "category": "self", "summary": "SUSE Bug 1043234", "url": "https://bugzilla.suse.com/1043234" }, { "category": "self", "summary": "SUSE Bug 1043935", "url": "https://bugzilla.suse.com/1043935" }, { "category": "self", "summary": "SUSE Bug 1044015", "url": "https://bugzilla.suse.com/1044015" }, { "category": "self", "summary": "SUSE Bug 1044125", "url": "https://bugzilla.suse.com/1044125" }, { "category": "self", "summary": "SUSE Bug 1044216", "url": "https://bugzilla.suse.com/1044216" }, { "category": "self", "summary": "SUSE Bug 1044230", "url": "https://bugzilla.suse.com/1044230" }, { "category": "self", "summary": "SUSE Bug 1044854", "url": "https://bugzilla.suse.com/1044854" }, { "category": "self", "summary": "SUSE Bug 1044882", "url": "https://bugzilla.suse.com/1044882" }, { "category": "self", "summary": "SUSE Bug 1044913", "url": "https://bugzilla.suse.com/1044913" }, { "category": "self", "summary": "SUSE Bug 1044985", "url": "https://bugzilla.suse.com/1044985" }, { "category": "self", "summary": "SUSE Bug 1045154", "url": "https://bugzilla.suse.com/1045154" }, { "category": "self", "summary": "SUSE Bug 1045340", "url": "https://bugzilla.suse.com/1045340" }, { "category": "self", "summary": "SUSE Bug 1045356", "url": "https://bugzilla.suse.com/1045356" }, { "category": "self", "summary": "SUSE Bug 1045406", "url": "https://bugzilla.suse.com/1045406" }, { "category": "self", "summary": "SUSE Bug 1045416", "url": "https://bugzilla.suse.com/1045416" }, { "category": "self", "summary": "SUSE Bug 1045525", "url": "https://bugzilla.suse.com/1045525" }, { "category": "self", "summary": "SUSE Bug 1045538", "url": "https://bugzilla.suse.com/1045538" }, { "category": "self", "summary": "SUSE Bug 1045547", "url": "https://bugzilla.suse.com/1045547" }, { "category": "self", "summary": "SUSE Bug 1045615", "url": "https://bugzilla.suse.com/1045615" }, { "category": "self", "summary": "SUSE Bug 1046107", "url": "https://bugzilla.suse.com/1046107" }, { "category": "self", "summary": "SUSE Bug 1046122", "url": "https://bugzilla.suse.com/1046122" }, { "category": "self", "summary": "SUSE Bug 1046192", "url": "https://bugzilla.suse.com/1046192" }, { "category": "self", "summary": "SUSE Bug 1046715", "url": "https://bugzilla.suse.com/1046715" }, { "category": "self", "summary": "SUSE Bug 1047027", "url": "https://bugzilla.suse.com/1047027" }, { "category": "self", "summary": "SUSE Bug 1047053", "url": "https://bugzilla.suse.com/1047053" }, { "category": "self", "summary": "SUSE Bug 1047343", "url": "https://bugzilla.suse.com/1047343" }, { "category": "self", "summary": "SUSE Bug 1047354", "url": "https://bugzilla.suse.com/1047354" }, { "category": "self", "summary": "SUSE Bug 1047487", "url": "https://bugzilla.suse.com/1047487" }, { "category": "self", "summary": "SUSE Bug 1047523", "url": "https://bugzilla.suse.com/1047523" }, { "category": "self", "summary": "SUSE Bug 1047653", "url": "https://bugzilla.suse.com/1047653" }, { "category": "self", "summary": "SUSE Bug 1048185", "url": "https://bugzilla.suse.com/1048185" }, { "category": "self", "summary": "SUSE Bug 1048221", "url": "https://bugzilla.suse.com/1048221" }, { "category": "self", "summary": "SUSE Bug 1048232", "url": "https://bugzilla.suse.com/1048232" }, { "category": "self", "summary": "SUSE Bug 1048275", "url": "https://bugzilla.suse.com/1048275" }, { "category": "self", "summary": "SUSE Bug 1049483", "url": "https://bugzilla.suse.com/1049483" }, { "category": "self", "summary": "SUSE Bug 1049603", "url": "https://bugzilla.suse.com/1049603" }, { "category": "self", "summary": "SUSE Bug 1049688", "url": "https://bugzilla.suse.com/1049688" }, { "category": "self", "summary": "SUSE Bug 1049882", "url": "https://bugzilla.suse.com/1049882" }, { "category": "self", "summary": "SUSE Bug 1050154", "url": "https://bugzilla.suse.com/1050154" }, { "category": "self", "summary": "SUSE Bug 1050431", "url": "https://bugzilla.suse.com/1050431" }, { "category": "self", "summary": "SUSE Bug 1051478", "url": "https://bugzilla.suse.com/1051478" }, { "category": "self", "summary": "SUSE Bug 1051515", "url": "https://bugzilla.suse.com/1051515" }, { "category": "self", "summary": "SUSE Bug 1051770", "url": "https://bugzilla.suse.com/1051770" }, { "category": "self", "summary": "SUSE Bug 784815", "url": "https://bugzilla.suse.com/784815" }, { "category": "self", "summary": "SUSE Bug 792863", "url": "https://bugzilla.suse.com/792863" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 870618", "url": "https://bugzilla.suse.com/870618" }, { "category": "self", "summary": "SUSE Bug 909486", "url": "https://bugzilla.suse.com/909486" }, { "category": "self", "summary": "SUSE Bug 909618", "url": "https://bugzilla.suse.com/909618" }, { "category": "self", "summary": "SUSE Bug 911105", "url": "https://bugzilla.suse.com/911105" }, { "category": "self", "summary": "SUSE Bug 919382", "url": "https://bugzilla.suse.com/919382" }, { "category": "self", "summary": "SUSE Bug 928138", "url": "https://bugzilla.suse.com/928138" }, { "category": "self", "summary": "SUSE Bug 931620", "url": "https://bugzilla.suse.com/931620" }, { "category": "self", "summary": "SUSE Bug 938352", "url": "https://bugzilla.suse.com/938352" }, { "category": "self", "summary": "SUSE Bug 943786", "url": "https://bugzilla.suse.com/943786" }, { "category": "self", "summary": "SUSE Bug 948562", "url": "https://bugzilla.suse.com/948562" }, { "category": "self", "summary": "SUSE Bug 962257", "url": "https://bugzilla.suse.com/962257" }, { "category": "self", "summary": "SUSE Bug 970956", "url": "https://bugzilla.suse.com/970956" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 972891", "url": "https://bugzilla.suse.com/972891" }, { "category": "self", "summary": "SUSE Bug 979021", "url": "https://bugzilla.suse.com/979021" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983212", "url": "https://bugzilla.suse.com/983212" }, { "category": "self", "summary": "SUSE Bug 985561", "url": "https://bugzilla.suse.com/985561" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986924", "url": "https://bugzilla.suse.com/986924" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989056", "url": "https://bugzilla.suse.com/989056" }, { "category": "self", "summary": "SUSE Bug 990682", "url": "https://bugzilla.suse.com/990682" }, { "category": "self", "summary": "SUSE Bug 991651", "url": "https://bugzilla.suse.com/991651" }, { "category": "self", "summary": "SUSE Bug 995542", "url": "https://bugzilla.suse.com/995542" }, { "category": "self", "summary": "SUSE Bug 999245", "url": "https://bugzilla.suse.com/999245" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9922 page", "url": "https://www.suse.com/security/cve/CVE-2014-9922/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-3288 page", "url": "https://www.suse.com/security/cve/CVE-2015-3288/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8970 page", "url": "https://www.suse.com/security/cve/CVE-2015-8970/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10200 page", "url": "https://www.suse.com/security/cve/CVE-2016-10200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2188 page", "url": "https://www.suse.com/security/cve/CVE-2016-2188/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5243 page", "url": "https://www.suse.com/security/cve/CVE-2016-5243/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000363 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000363/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000364 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000364/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000365 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000365/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000380 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000380/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11176 page", "url": "https://www.suse.com/security/cve/CVE-2017-11176/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-11473 page", "url": "https://www.suse.com/security/cve/CVE-2017-11473/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2647 page", "url": "https://www.suse.com/security/cve/CVE-2017-2647/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2671 page", "url": "https://www.suse.com/security/cve/CVE-2017-2671/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5669 page", "url": "https://www.suse.com/security/cve/CVE-2017-5669/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5970 page", "url": "https://www.suse.com/security/cve/CVE-2017-5970/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5986 page", "url": "https://www.suse.com/security/cve/CVE-2017-5986/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6074 page", "url": "https://www.suse.com/security/cve/CVE-2017-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6214 page", "url": "https://www.suse.com/security/cve/CVE-2017-6214/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6348 page", "url": "https://www.suse.com/security/cve/CVE-2017-6348/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6353 page", "url": "https://www.suse.com/security/cve/CVE-2017-6353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6951 page", "url": "https://www.suse.com/security/cve/CVE-2017-6951/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7184 page", "url": "https://www.suse.com/security/cve/CVE-2017-7184/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7187 page", "url": "https://www.suse.com/security/cve/CVE-2017-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7261 page", "url": "https://www.suse.com/security/cve/CVE-2017-7261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7294 page", "url": "https://www.suse.com/security/cve/CVE-2017-7294/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7308 page", "url": "https://www.suse.com/security/cve/CVE-2017-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7482 page", "url": "https://www.suse.com/security/cve/CVE-2017-7482/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7487 page", "url": "https://www.suse.com/security/cve/CVE-2017-7487/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7533 page", "url": "https://www.suse.com/security/cve/CVE-2017-7533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7542 page", "url": "https://www.suse.com/security/cve/CVE-2017-7542/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7616 page", "url": "https://www.suse.com/security/cve/CVE-2017-7616/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8924 page", "url": "https://www.suse.com/security/cve/CVE-2017-8924/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8925 page", "url": "https://www.suse.com/security/cve/CVE-2017-8925/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9074 page", "url": "https://www.suse.com/security/cve/CVE-2017-9074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9075 page", "url": "https://www.suse.com/security/cve/CVE-2017-9075/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9076 page", "url": "https://www.suse.com/security/cve/CVE-2017-9076/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-09-04T13:37:48Z", "generator": { "date": "2017-09-04T13:37:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:2342-1", "initial_release_date": "2017-09-04T13:37:48Z", "revision_history": [ { "date": "2017-09-04T13:37:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-69.5.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9922", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9922" } ], "notes": [ { "category": "general", "text": "The eCryptfs subsystem in the Linux kernel before 3.18 allows local users to gain privileges via a large filesystem stack that includes an overlayfs layer, related to fs/ecryptfs/main.c and fs/overlayfs/super.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9922", "url": "https://www.suse.com/security/cve/CVE-2014-9922" }, { "category": "external", "summary": "SUSE Bug 1032340 for CVE-2014-9922", "url": "https://bugzilla.suse.com/1032340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2014-9922" }, { "cve": "CVE-2015-3288", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-3288" } ], "notes": [ { "category": "general", "text": "mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-3288", "url": "https://www.suse.com/security/cve/CVE-2015-3288" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-3288", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979021 for CVE-2015-3288", "url": "https://bugzilla.suse.com/979021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2015-3288" }, { "cve": "CVE-2015-8970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8970" } ], "notes": [ { "category": "general", "text": "crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8970", "url": "https://www.suse.com/security/cve/CVE-2015-8970" }, { "category": "external", "summary": "SUSE Bug 1008374 for CVE-2015-8970", "url": "https://bugzilla.suse.com/1008374" }, { "category": "external", "summary": "SUSE Bug 1008850 for CVE-2015-8970", "url": "https://bugzilla.suse.com/1008850" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2015-8970" }, { "cve": "CVE-2016-10200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10200" } ], "notes": [ { "category": "general", "text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10200", "url": "https://www.suse.com/security/cve/CVE-2016-10200" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1028415 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1028415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2016-10200" }, { "cve": "CVE-2016-2188", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2188" } ], "notes": [ { "category": "general", "text": "The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2188", "url": "https://www.suse.com/security/cve/CVE-2016-2188" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1067912 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1067912" }, { "category": "external", "summary": "SUSE Bug 1132190 for CVE-2016-2188", "url": "https://bugzilla.suse.com/1132190" }, { "category": "external", "summary": "SUSE Bug 970956 for CVE-2016-2188", "url": "https://bugzilla.suse.com/970956" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2016-2188" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5243" } ], "notes": [ { "category": "general", "text": "The tipc_nl_compat_link_dump function in net/tipc/netlink_compat.c in the Linux kernel through 4.6.3 does not properly copy a certain string, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5243", "url": "https://www.suse.com/security/cve/CVE-2016-5243" }, { "category": "external", "summary": "SUSE Bug 983212 for CVE-2016-5243", "url": "https://bugzilla.suse.com/983212" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5243", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2016-5243" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2017-1000363", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000363" } ], "notes": [ { "category": "general", "text": "Linux drivers/char/lp.c Out-of-Bounds Write. Due to a missing bounds check, and the fact that parport_ptr integer is static, a \u0027secure boot\u0027 kernel command line adversary (can happen due to bootloader vulns, e.g. Google Nexus 6\u0027s CVE-2016-10277, where due to a vulnerability the adversary has partial control over the command line) can overflow the parport_nr array in the following code, by appending many (\u003eLP_NO) \u0027lp=none\u0027 arguments to the command line.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000363", "url": "https://www.suse.com/security/cve/CVE-2017-1000363" }, { "category": "external", "summary": "SUSE Bug 1039456 for CVE-2017-1000363", "url": "https://bugzilla.suse.com/1039456" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000363", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-1000363" }, { "cve": "CVE-2017-1000364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000364" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000364", "url": "https://www.suse.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "SUSE Bug 1039346 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1039346" }, { "category": "external", "summary": "SUSE Bug 1039348 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1039348" }, { "category": "external", "summary": "SUSE Bug 1042200 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1042200" }, { "category": "external", "summary": "SUSE Bug 1044985 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1044985" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1071943" }, { "category": "external", "summary": "SUSE Bug 1075506 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1075506" }, { "category": "external", "summary": "SUSE Bug 1077345 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1077345" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1149726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-1000364" }, { "cve": "CVE-2017-1000365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000365" } ], "notes": [ { "category": "general", "text": "The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000365", "url": "https://www.suse.com/security/cve/CVE-2017-1000365" }, { "category": "external", "summary": "SUSE Bug 1037551 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1037551" }, { "category": "external", "summary": "SUSE Bug 1039346 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039346" }, { "category": "external", "summary": "SUSE Bug 1039349 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039349" }, { "category": "external", "summary": "SUSE Bug 1039354 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039354" }, { "category": "external", "summary": "SUSE Bug 1054557 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1054557" }, { "category": "external", "summary": "SUSE Bug 1077345 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1077345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2017-1000365" }, { "cve": "CVE-2017-1000380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000380" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000380", "url": "https://www.suse.com/security/cve/CVE-2017-1000380" }, { "category": "external", "summary": "SUSE Bug 1044125 for CVE-2017-1000380", "url": "https://bugzilla.suse.com/1044125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2017-1000380" }, { "cve": "CVE-2017-11176", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11176" } ], "notes": [ { "category": "general", "text": "The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user-space close of a Netlink socket, it allows attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11176", "url": "https://www.suse.com/security/cve/CVE-2017-11176" }, { "category": "external", "summary": "SUSE Bug 1048275 for CVE-2017-11176", "url": "https://bugzilla.suse.com/1048275" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11176", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-11176" }, { "cve": "CVE-2017-11473", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-11473" } ], "notes": [ { "category": "general", "text": "Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 3.2 allows local users to gain privileges via a crafted ACPI table.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-11473", "url": "https://www.suse.com/security/cve/CVE-2017-11473" }, { "category": "external", "summary": "SUSE Bug 1049603 for CVE-2017-11473", "url": "https://bugzilla.suse.com/1049603" }, { "category": "external", "summary": "SUSE Bug 1061680 for CVE-2017-11473", "url": "https://bugzilla.suse.com/1061680" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-11473", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-11473", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-11473" }, { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-2647", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2647" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 3.18 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving a NULL value for a certain match field, related to the keyring_search_iterator function in keyring.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2647", "url": "https://www.suse.com/security/cve/CVE-2017-2647" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1030593" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2647", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-2647" }, { "cve": "CVE-2017-2671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2671" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2671", "url": "https://www.suse.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031003 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1031003" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-2671" }, { "cve": "CVE-2017-5669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5669" } ], "notes": [ { "category": "general", "text": "The do_shmat function in ipc/shm.c in the Linux kernel through 4.9.12 does not restrict the address calculated by a certain rounding operation, which allows local users to map page zero, and consequently bypass a protection mechanism that exists for the mmap system call, by making crafted shmget and shmat system calls in a privileged context.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5669", "url": "https://www.suse.com/security/cve/CVE-2017-5669" }, { "category": "external", "summary": "SUSE Bug 1026914 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1026914" }, { "category": "external", "summary": "SUSE Bug 1102390 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1102390" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5669", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-5669" }, { "cve": "CVE-2017-5970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5970" } ], "notes": [ { "category": "general", "text": "The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5970", "url": "https://www.suse.com/security/cve/CVE-2017-5970" }, { "category": "external", "summary": "SUSE Bug 1024938 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1024938" }, { "category": "external", "summary": "SUSE Bug 1025013 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1025013" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-5970" }, { "cve": "CVE-2017-5986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5986" } ], "notes": [ { "category": "general", "text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5986", "url": "https://www.suse.com/security/cve/CVE-2017-5986" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-5986" }, { "cve": "CVE-2017-6074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6074" } ], "notes": [ { "category": "general", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6074", "url": "https://www.suse.com/security/cve/CVE-2017-6074" }, { "category": "external", "summary": "SUSE Bug 1026024 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1026024" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1072204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-6074" }, { "cve": "CVE-2017-6214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6214" } ], "notes": [ { "category": "general", "text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6214", "url": "https://www.suse.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "SUSE Bug 1026722 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1026722" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-6214" }, { "cve": "CVE-2017-6348", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6348" } ], "notes": [ { "category": "general", "text": "The hashbin_delete function in net/irda/irqueue.c in the Linux kernel before 4.9.13 improperly manages lock dropping, which allows local users to cause a denial of service (deadlock) via crafted operations on IrDA devices.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6348", "url": "https://www.suse.com/security/cve/CVE-2017-6348" }, { "category": "external", "summary": "SUSE Bug 1027178 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1027178" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6348", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-6348" }, { "cve": "CVE-2017-6353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6353" } ], "notes": [ { "category": "general", "text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6353", "url": "https://www.suse.com/security/cve/CVE-2017-6353" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-6353" }, { "cve": "CVE-2017-6951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6951" } ], "notes": [ { "category": "general", "text": "The keyring_search_aux function in security/keys/keyring.c in the Linux kernel through 3.14.79 allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a request_key system call for the \"dead\" type.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6951", "url": "https://www.suse.com/security/cve/CVE-2017-6951" }, { "category": "external", "summary": "SUSE Bug 1029850 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1029850" }, { "category": "external", "summary": "SUSE Bug 1030593 for CVE-2017-6951", "url": "https://bugzilla.suse.com/1030593" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-6951" }, { "cve": "CVE-2017-7184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7184" } ], "notes": [ { "category": "general", "text": "The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7184", "url": "https://www.suse.com/security/cve/CVE-2017-7184" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1030575 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1030575" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7184" }, { "cve": "CVE-2017-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7187" } ], "notes": [ { "category": "general", "text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7187", "url": "https://www.suse.com/security/cve/CVE-2017-7187" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1030213 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1030213" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7187" }, { "cve": "CVE-2017-7261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7261" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7261", "url": "https://www.suse.com/security/cve/CVE-2017-7261" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031052 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1031052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7261" }, { "cve": "CVE-2017-7294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7294" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7294", "url": "https://www.suse.com/security/cve/CVE-2017-7294" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031440 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031440" }, { "category": "external", "summary": "SUSE Bug 1031481 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031481" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7294" }, { "cve": "CVE-2017-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7308" } ], "notes": [ { "category": "general", "text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7308", "url": "https://www.suse.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031579 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031579" }, { "category": "external", "summary": "SUSE Bug 1031660 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031660" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7308" }, { "cve": "CVE-2017-7482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7482" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before version 4.12, Kerberos 5 tickets decoded when using the RXRPC keys incorrectly assumes the size of a field. This could lead to the size-remaining variable wrapping and the data pointer going over the end of the buffer. This could possibly lead to memory corruption and possible privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7482", "url": "https://www.suse.com/security/cve/CVE-2017-7482" }, { "category": "external", "summary": "SUSE Bug 1046107 for CVE-2017-7482", "url": "https://bugzilla.suse.com/1046107" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7482", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7482" }, { "cve": "CVE-2017-7487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7487" } ], "notes": [ { "category": "general", "text": "The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7487", "url": "https://www.suse.com/security/cve/CVE-2017-7487" }, { "category": "external", "summary": "SUSE Bug 1038879 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038879" }, { "category": "external", "summary": "SUSE Bug 1038883 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038883" }, { "category": "external", "summary": "SUSE Bug 1038981 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038981" }, { "category": "external", "summary": "SUSE Bug 1038982 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038982" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2017-7487", "url": "https://bugzilla.suse.com/870618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7487" }, { "cve": "CVE-2017-7533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7533" } ], "notes": [ { "category": "general", "text": "Race condition in the fsnotify implementation in the Linux kernel through 4.12.4 allows local users to gain privileges or cause a denial of service (memory corruption) via a crafted application that leverages simultaneous execution of the inotify_handle_event and vfs_rename functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7533", "url": "https://www.suse.com/security/cve/CVE-2017-7533" }, { "category": "external", "summary": "SUSE Bug 1049483 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1049483" }, { "category": "external", "summary": "SUSE Bug 1050677 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050677" }, { "category": "external", "summary": "SUSE Bug 1050751 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1050751" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2017-7533", "url": "https://bugzilla.suse.com/1053919" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-7533" }, { "cve": "CVE-2017-7542", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7542" } ], "notes": [ { "category": "general", "text": "The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7542", "url": "https://www.suse.com/security/cve/CVE-2017-7542" }, { "category": "external", "summary": "SUSE Bug 1049882 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1049882" }, { "category": "external", "summary": "SUSE Bug 1061936 for CVE-2017-7542", "url": "https://bugzilla.suse.com/1061936" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7542" }, { "cve": "CVE-2017-7616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7616" } ], "notes": [ { "category": "general", "text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7616", "url": "https://www.suse.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "SUSE Bug 1033336 for CVE-2017-7616", "url": "https://bugzilla.suse.com/1033336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-7616" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-8924", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8924" } ], "notes": [ { "category": "general", "text": "The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8924", "url": "https://www.suse.com/security/cve/CVE-2017-8924" }, { "category": "external", "summary": "SUSE Bug 1037182 for CVE-2017-8924", "url": "https://bugzilla.suse.com/1037182" }, { "category": "external", "summary": "SUSE Bug 1038981 for CVE-2017-8924", "url": "https://bugzilla.suse.com/1038981" }, { "category": "external", "summary": "SUSE Bug 1038982 for CVE-2017-8924", "url": "https://bugzilla.suse.com/1038982" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2017-8924", "url": "https://bugzilla.suse.com/870618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2017-8924" }, { "cve": "CVE-2017-8925", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8925" } ], "notes": [ { "category": "general", "text": "The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8925", "url": "https://www.suse.com/security/cve/CVE-2017-8925" }, { "category": "external", "summary": "SUSE Bug 1037183 for CVE-2017-8925", "url": "https://bugzilla.suse.com/1037183" }, { "category": "external", "summary": "SUSE Bug 1038981 for CVE-2017-8925", "url": "https://bugzilla.suse.com/1038981" }, { "category": "external", "summary": "SUSE Bug 1038982 for CVE-2017-8925", "url": "https://bugzilla.suse.com/1038982" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2017-8925", "url": "https://bugzilla.suse.com/870618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "low" } ], "title": "CVE-2017-8925" }, { "cve": "CVE-2017-9074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9074" } ], "notes": [ { "category": "general", "text": "The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9074", "url": "https://www.suse.com/security/cve/CVE-2017-9074" }, { "category": "external", "summary": "SUSE Bug 1039882 for CVE-2017-9074", "url": "https://bugzilla.suse.com/1039882" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9074", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-9074" }, { "cve": "CVE-2017-9075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9075" } ], "notes": [ { "category": "general", "text": "The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9075", "url": "https://www.suse.com/security/cve/CVE-2017-9075" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-9075" }, { "cve": "CVE-2017-9076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9076" } ], "notes": [ { "category": "general", "text": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9076", "url": "https://www.suse.com/security/cve/CVE-2017-9076" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-9076" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-69.5.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-69.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-09-04T13:37:48Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2016:1937-1
Vulnerability from csaf_suse
Published
2016-08-02 11:06
Modified
2016-08-02 11:06
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.
Main feature additions:
- Improved support for Clustered File System (CephFS, fate#318586).
The following security bugs were fixed:
- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).
- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).
- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).
- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).
- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).
- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).
- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).
- CacheFiles: Handle object being killed before being set up (bsc#971049).
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).
- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).
- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).
- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).
- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).
- FS-Cache: Out of line fscache_operation_init() (bsc#971049).
- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).
- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).
- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).
- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).
- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).
- FS-Cache: Timeout for releasepage() (bsc#971049).
- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).
- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- Fix kabi issue (bsc#971049).
- Input: i8042 - lower log level for 'no controller' message (bsc#945345).
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NVMe: Unify controller probe and resume (bsc#979347).
- NVMe: init nvme queue before enabling irq (bsc#662458).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).
- Revert 'scsi: fix soft lockup in scsi_remove_target() on module removal' (bsc#970609).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).
- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- base: make module_create_drivers_dir race-free (bnc#983977).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph fscache: Introduce a routine for uncaching single no data page from fscache.
- ceph fscache: Uncaching no data page from fscache in readpage().
- ceph: Asynchronous IO support.
- ceph: Avoid to propagate the invalid page point.
- ceph: Clean up if error occurred in finish_read().
- ceph: EIO all operations after forced umount.
- ceph: Implement writev/pwritev for sync operation.
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: Remove racey watch/notify event infrastructure (bsc#964727)
- ceph: add acl for cephfs.
- ceph: add acl, noacl options for cephfs mount.
- ceph: add get_name() NFS export callback.
- ceph: add get_parent() NFS export callback.
- ceph: add imported caps when handling cap export message.
- ceph: add inline data to pagecache.
- ceph: add missing init_acl() for mkdir() and atomic_open().
- ceph: add open export target session helper.
- ceph: add request to i_unsafe_dirops when getting unsafe reply.
- ceph: additional debugfs output.
- ceph: always re-send cap flushes when MDS recovers.
- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).
- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).
- ceph: avoid releasing caps that are being used.
- ceph: avoid sending unnessesary FLUSHSNAP message.
- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().
- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().
- ceph: ceph_frag_contains_value can be boolean.
- ceph: ceph_get_parent() can be static.
- ceph: check OSD caps before read/write.
- ceph: check buffer size in ceph_vxattrcb_layout().
- ceph: check caps in filemap_fault and page_mkwrite.
- ceph: check directory's completeness before emitting directory entry.
- ceph: check inode caps in ceph_d_revalidate.
- ceph: check unsupported fallocate mode.
- ceph: check zero length in ceph_sync_read().
- ceph: checking for IS_ERR instead of NULL.
- ceph: cleanup unsafe requests when reconnecting is denied.
- ceph: cleanup use of ceph_msg_get.
- ceph: clear directory's completeness when creating file.
- ceph: convert inline data to normal data before data write.
- ceph: do not assume r_old_dentry[_dir] always set together.
- ceph: do not chain inode updates to parent fsync.
- ceph: do not grabs open file reference for aborted request.
- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().
- ceph: do not include used caps in cap_wanted.
- ceph: do not invalidate page cache when inode is no longer used.
- ceph: do not mark dirty caps when there is no auth cap.
- ceph: do not pre-allocate space for cap release messages.
- ceph: do not set r_old_dentry_dir on link().
- ceph: do not trim auth cap when there are cap snaps.
- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.
- ceph: drop cap releases in requests composed before cap reconnect.
- ceph: drop extra open file reference in ceph_atomic_open().
- ceph: drop unconnected inodes.
- ceph: exclude setfilelock requests when calculating oldest tid.
- ceph: export ceph_session_state_name function.
- ceph: fetch inline data when getting Fcr cap refs.
- ceph: fix __dcache_readdir().
- ceph: fix a comment typo.
- ceph: fix append mode write.
- ceph: fix atomic_open snapdir.
- ceph: fix bool assignments.
- ceph: fix cache revoke race.
- ceph: fix ceph_dir_llseek().
- ceph: fix ceph_fh_to_parent().
- ceph: fix ceph_removexattr().
- ceph: fix ceph_set_acl().
- ceph: fix ceph_writepages_start().
- ceph: fix dcache/nocache mount option.
- ceph: fix dentry leaks.
- ceph: fix directory fsync.
- ceph: fix divide-by-zero in __validate_layout().
- ceph: fix double page_unlock() in page_mkwrite().
- ceph: fix dout() compile warnings in ceph_filemap_fault().
- ceph: fix file lock interruption.
- ceph: fix flush tid comparision.
- ceph: fix flushing caps.
- ceph: fix llistxattr on symlink.
- ceph: fix message length computation.
- ceph: fix mksnap crash.
- ceph: fix null pointer dereference in send_mds_reconnect().
- ceph: fix pr_fmt() redefinition.
- ceph: fix queuing inode to mdsdir's snaprealm.
- ceph: fix reading inline data when i_size greater than PAGE_SIZE.
- ceph: fix request time stamp encoding.
- ceph: fix reset_readdir().
- ceph: fix setting empty extended attribute.
- ceph: fix sizeof(struct tYpO *) typo.
- ceph: fix snap context leak in error path.
- ceph: fix trim caps.
- ceph: fix uninline data function.
- ceph: flush cap release queue when trimming session caps.
- ceph: flush inline version.
- ceph: forbid mandatory file lock.
- ceph: fscache: Update object store limit after file writing.
- ceph: fscache: Wait for completion of object initialization.
- ceph: fscache: add an interface to synchronize object store limit.
- ceph: get inode size for each append write.
- ceph: handle -ESTALE reply.
- ceph: handle SESSION_FORCE_RO message.
- ceph: handle cap export race in try_flush_caps().
- ceph: handle cap import atomically.
- ceph: handle frag mismatch between readdir request and reply.
- ceph: handle race between cap reconnect and cap release.
- ceph: handle session flush message.
- ceph: hold on to exclusive caps on complete directories.
- ceph: implement readv/preadv for sync operation.
- ceph: improve readahead for file holes.
- ceph: improve reference tracking for snaprealm.
- ceph: include time stamp in every MDS request.
- ceph: include time stamp in replayed MDS requests.
- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.
- ceph: initialize inode before instantiating dentry.
- ceph: introduce a new inode flag indicating if cached dentries are ordered.
- ceph: introduce ceph_fill_fragtree().
- ceph: introduce global empty snap context.
- ceph: invalidate dirty pages after forced umount.
- ceph: keep i_snap_realm while there are writers.
- ceph: kstrdup() memory handling.
- ceph: let MDS adjust readdir 'frag'.
- ceph: make ceph_forget_all_cached_acls() static inline.
- ceph: make fsync() wait unsafe requests that created/modified inode.
- ceph: make sure syncfs flushes all cap snaps.
- ceph: make sure write caps are registered with auth MDS.
- ceph: match wait_for_completion_timeout return type.
- ceph: message versioning fixes.
- ceph: move ceph_find_inode() outside the s_mutex.
- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.
- ceph: no need to get parent inode in ceph_open.
- ceph: parse inline data in MClientReply and MClientCaps.
- ceph: pre-allocate ceph_cap struct for ceph_add_cap().
- ceph: pre-allocate data structure that tracks caps flushing.
- ceph: preallocate buffer for readdir reply.
- ceph: print inode number for LOOKUPINO request.
- ceph: properly apply umask when ACL is enabled.
- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.
- ceph: properly mark empty directory as complete.
- ceph: properly release page upon error.
- ceph: properly zero data pages for file holes.
- ceph: provide seperate {inode,file}_operations for snapdir.
- ceph: queue cap release in __ceph_remove_cap().
- ceph: queue vmtruncate if necessary when handing cap grant/revoke.
- ceph: ratelimit warn messages for MDS closes session.
- ceph: re-send AIO write request when getting -EOLDSNAP error.
- ceph: re-send flushing caps (which are revoked) in reconnect stage.
- ceph: re-send requests when MDS enters reconnecting stage.
- ceph: refactor readpage_nounlock() to make the logic clearer.
- ceph: remember subtree root dirfrag's auth MDS.
- ceph: remove exported caps when handling cap import message.
- ceph: remove outdated frag information.
- ceph: remove redundant code for max file size verification.
- ceph: remove redundant declaration.
- ceph: remove redundant memset(0).
- ceph: remove redundant test of head->safe and silence static analysis warnings.
- ceph: remove the useless judgement.
- ceph: remove unused functions in ceph_frag.h.
- ceph: remove unused stringification macros.
- ceph: remove useless ACL check.
- ceph: remove xattr when null value is given to setxattr().
- ceph: rename snapshot support.
- ceph: replace comma with a semicolon.
- ceph: request xattrs if xattr_version is zero.
- ceph: reserve caps for file layout/lock MDS requests.
- ceph: reset r_resend_mds after receiving -ESTALE.
- ceph: return error for traceless reply race.
- ceph: rework dcache readdir.
- ceph: send TID of the oldest pending caps flush to MDS.
- ceph: send client metadata to MDS.
- ceph: set caps count after composing cap reconnect message.
- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.
- ceph: set mds_wanted when MDS reply changes a cap to auth cap.
- ceph: show nocephx_require_signatures and notcp_nodelay options.
- ceph: show non-default options only.
- ceph: simplify ceph_fh_to_dentry().
- ceph: simplify two mount_timeout sites.
- ceph: skip invalid dentry during dcache readdir.
- ceph: support inline data feature.
- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.
- ceph: sync read inline data.
- ceph: take snap_rwsem when accessing snap realm's cached_context.
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- ceph: track pending caps flushing accurately.
- ceph: track pending caps flushing globally.
- ceph: trim unused inodes before reconnecting to recovering MDS.
- ceph: trivial comment fix.
- ceph: update i_max_size even if inode version does not change.
- ceph: update inode fields according to issued caps.
- ceph: use %zu for len in ceph_fill_inline_data().
- ceph: use ceph_seq_cmp() to compare migrate_seq.
- ceph: use empty snap context for uninline_data and get_pool_perm.
- ceph: use fl->fl_file as owner identifier of flock and posix lock.
- ceph: use fl->fl_type to decide flock operation.
- ceph: use fpos_cmp() to compare dentry positions.
- ceph: use getattr request to fetch inline data.
- ceph: use i_size_{read,write} to get/set i_size.
- ceph: use msecs_to_jiffies for time conversion.
- ceph: use pagelist to present MDS request data.
- ceph: use truncate_pagecache() instead of truncate_inode_pages().
- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.
- client: include kernel version in client metadata.
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- crush: add chooseleaf_stable tunable.
- crush: decode and initialize chooseleaf_stable.
- crush: ensure bucket id is valid before indexing buckets array.
- crush: ensure take bucket value is valid.
- crush: fix crash from invalid 'take' argument.
- crush: sync up with userspace.
- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).
- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- fs/ceph/debugfs.c: replace seq_printf by seq_puts.
- fs/ceph: replace pr_warning by pr_warn.
- hid-elo: kill not flush the work (bnc#982354).
- hv: util: Pass the channel information during the init call (bnc#978527).
- hv: utils: Invoke the poll function after handshake (bnc#978527).
- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).
- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)
- kabi/severities: Whitelist libceph and rbd (bsc#964727).
- kabi/severities: Whitelist libceph and rbd.
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).
- kgraft/gfs2: Do not block livepatching in the log daemon for too long.
- kgraft/xen: Do not block livepatching in the XEN blkif kthread.
- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.
- libceph: Fix ceph_tcp_sendpage()'s more boolean usage.
- libceph: MOSDOpReply v7 encoding.
- libceph: Remove spurious kunmap() of the zero page.
- libceph: a couple tweaks for wait loops.
- libceph: add nocephx_sign_messages option.
- libceph: advertise support for TUNABLES5.
- libceph: advertise support for keepalive2.
- libceph: allow setting osd_req_op's flags.
- libceph: check data_len in ->alloc_msg().
- libceph: clear messenger auth_retry flag if we fault.
- libceph: clear msg->con in ceph_msg_release() only.
- libceph: do not access invalid memory in keepalive2 path.
- libceph: do not spam dmesg with stray reply warnings.
- libceph: drop authorizer check from cephx msg signing routines.
- libceph: evaluate osd_req_op_data() arguments only once.
- libceph: fix authorizer invalidation, take 2.
- libceph: fix ceph_msg_revoke().
- libceph: fix wrong name 'Ceph filesystem for Linux'.
- libceph: handle writefull for OSD op extent init (bsc#980706).
- libceph: introduce ceph_x_authorizer_cleanup().
- libceph: invalidate AUTH in addition to a service ticket.
- libceph: kill off ceph_x_ticket_handler::validity.
- libceph: move ceph_file_layout helpers to ceph_fs.h.
- libceph: msg signing callouts do not need con argument.
- libceph: nuke time_sub().
- libceph: properly release STAT request's raw_data_in.
- libceph: remove con argument in handle_reply().
- libceph: remove outdated comment.
- libceph: remove the unused macro AES_KEY_SIZE.
- libceph: rename con_work() to ceph_con_workfn().
- libceph: set 'exists' flag for newly up osd.
- libceph: stop duplicating client fields in messenger.
- libceph: store timeouts in jiffies, verify user input.
- libceph: treat sockaddr_storage with uninitialized family as blank.
- libceph: use keepalive2 to verify the mon session is alive.
- libceph: use list_for_each_entry_safe.
- libceph: use list_next_entry instead of list_entry_next.
- libceph: use local variable cursor instead of msg->cursor.
- libceph: use the right footer size when skipping a message.
- libfc: replace 'rp_mutex' with 'rp_lock' (bsc#953233, bsc#962846).
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change ->>inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mds: check cap ID when handling cap export message.
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mmc: sdhci: Allow for irq being shared (bnc#977582).
- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).
- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: batch adjacent full stripe write (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- rbd: bump queue_max_segments.
- rbd: delete an unnecessary check before rbd_dev_destroy().
- rbd: do not free rbd_dev outside of the release callback.
- rbd: do not put snap_context twice in rbd_queue_workfn().
- rbd: drop null test before destroy functions.
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- rbd: plug rbd_dev->header.object_prefix memory leak.
- rbd: rbd_wq comment is obsolete.
- rbd: remove duplicate calls to rbd_dev_mapping_clear().
- rbd: report unsupported features to syslog (bsc#979169).
- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.
- rbd: set device_type::release instead of device::release.
- rbd: set max_sectors explicitly.
- rbd: store rbd_options in rbd_device.
- rbd: terminate rbd_opts_tokens with Opt_err.
- rbd: timeout watch teardown on unmap with mount_timeout.
- rbd: use writefull op for object size writes.
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).
- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#974692, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- scsi-bnx2fc-handle_scsi_retry_delay
- scsi-bnx2fc-soft_lockup_when_rmmod
- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).
- sd: get disk reference in sd_check_events() (bnc#897662).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- vgaarb: Add more context to error messages (bsc#976868).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1133
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.61 to receive various security and bugfixes.\n\nMain feature additions:\n- Improved support for Clustered File System (CephFS, fate#318586).\n\nThe following security bugs were fixed:\n- CVE-2014-9717: fs/namespace.c in the Linux kernel processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allowed local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace (bnc#928547).\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2015-8539: The KEYS subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c (bnc#958463).\n- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-2847: fs/pipe.c in the Linux kernel did not limit the amount of unread data in pipes, which allowed local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes (bnc#970948).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call (bnc#986569).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- Add wait_event_cmd() (bsc#953048).\n- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- Btrfs: do not collect ordered extents when logging that inode exists (bsc#977685).\n- Btrfs: do not return EBUSY on concurrent subvolume mounts (bsc#951844).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: fix empty symlink after creating symlink and fsync parent dir (bsc#977685).\n- Btrfs: fix file loss on log replay after renaming a file and fsync (bsc#977685).\n- Btrfs: fix file/data loss caused by fsync after rename and new inode (bsc#977685).\n- Btrfs: fix for incorrect directory entries after fsync log replay (bsc#957805, bsc#977685).\n- Btrfs: fix race between fsync and lockless direct IO writes (bsc#977685).\n- Btrfs: fix unreplayable log after snapshot delete + parent dir fsync (bsc#977685).\n- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).\n- CacheFiles: Fix incorrect test for in-memory object collision (bsc#971049).\n- CacheFiles: Handle object being killed before being set up (bsc#971049).\n- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).\n- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).\n- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).\n- EDAC/sb_edac: Fix computation of channel address (bsc#979521).\n- EDAC: Correct channel count limit (bsc#979521).\n- EDAC: Remove arbitrary limit on number of channels (bsc#979521).\n- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).\n- FS-Cache: Add missing initialization of ret in cachefiles_write_page() (bsc#971049).\n- FS-Cache: Count culled objects and objects rejected due to lack of space (bsc#971049).\n- FS-Cache: Fix cancellation of in-progress operation (bsc#971049).\n- FS-Cache: Handle a new operation submitted against a killed object (bsc#971049).\n- FS-Cache: Move fscache_report_unexpected_submission() to make it more available (bsc#971049).\n- FS-Cache: Out of line fscache_operation_init() (bsc#971049).\n- FS-Cache: Permit fscache_cancel_op() to cancel in-progress operations too (bsc#971049).\n- FS-Cache: Put an aborted initialised op so that it is accounted correctly (bsc#971049).\n- FS-Cache: Reduce cookie ref count if submit fails (bsc#971049).\n- FS-Cache: Synchronise object death state change vs operation submission (bsc#971049).\n- FS-Cache: The operation cancellation method needs calling in more places (bsc#971049).\n- FS-Cache: Timeout for releasepage() (bsc#971049).\n- FS-Cache: When submitting an op, cancel it if the target object is dying (bsc#971049).\n- FS-Cache: fscache_object_is_dead() has wrong logic, kill it (bsc#971049).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- Fix kabi issue (bsc#971049).\n- Input: i8042 - lower log level for \u0027no controller\u0027 message (bsc#945345).\n- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- NVMe: init nvme queue before enabling irq (bsc#662458).\n- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).\n- Refresh patches.xen/xen-netback-coalesce: Restore copying of SKBs with head exceeding page size (bsc#978469).\n- Revert \u0027scsi: fix soft lockup in scsi_remove_target() on module removal\u0027 (bsc#970609).\n- SCSI: Increase REPORT_LUNS timeout (bsc#982282).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.\n- Update patches.kernel.org/patch-3.12.55-56 references (add bsc#973570).\n- Use mainline variant of hyperv KVP IP failover patch (bnc#978527)\n- VSOCK: Fix lockdep issue (bsc#977417).\n- VSOCK: sock_put wasn\u0027t safe to call in interrupt context (bsc#977417).\n- Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).\n- cachefiles: perform test on s_blocksize when opening cache file (bsc#971049).\n- cdc_ncm: workaround for EM7455 \u0027silent\u0027 data interface (bnc#988552).\n- ceph fscache: Introduce a routine for uncaching single no data page from fscache.\n- ceph fscache: Uncaching no data page from fscache in readpage().\n- ceph: Asynchronous IO support.\n- ceph: Avoid to propagate the invalid page point.\n- ceph: Clean up if error occurred in finish_read().\n- ceph: EIO all operations after forced umount.\n- ceph: Implement writev/pwritev for sync operation.\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: Remove racey watch/notify event infrastructure (bsc#964727)\n- ceph: add acl for cephfs.\n- ceph: add acl, noacl options for cephfs mount.\n- ceph: add get_name() NFS export callback.\n- ceph: add get_parent() NFS export callback.\n- ceph: add imported caps when handling cap export message.\n- ceph: add inline data to pagecache.\n- ceph: add missing init_acl() for mkdir() and atomic_open().\n- ceph: add open export target session helper.\n- ceph: add request to i_unsafe_dirops when getting unsafe reply.\n- ceph: additional debugfs output.\n- ceph: always re-send cap flushes when MDS recovers.\n- ceph: avoid block operation when !TASK_RUNNING (ceph_get_caps).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_close_sessions).\n- ceph: avoid block operation when !TASK_RUNNING (ceph_mdsc_sync).\n- ceph: avoid releasing caps that are being used.\n- ceph: avoid sending unnessesary FLUSHSNAP message.\n- ceph: avoid useless ceph_get_dentry_parent_inode() in ceph_rename().\n- ceph: cast PAGE_SIZE to size_t in ceph_sync_write().\n- ceph: ceph_frag_contains_value can be boolean.\n- ceph: ceph_get_parent() can be static.\n- ceph: check OSD caps before read/write.\n- ceph: check buffer size in ceph_vxattrcb_layout().\n- ceph: check caps in filemap_fault and page_mkwrite.\n- ceph: check directory\u0027s completeness before emitting directory entry.\n- ceph: check inode caps in ceph_d_revalidate.\n- ceph: check unsupported fallocate mode.\n- ceph: check zero length in ceph_sync_read().\n- ceph: checking for IS_ERR instead of NULL.\n- ceph: cleanup unsafe requests when reconnecting is denied.\n- ceph: cleanup use of ceph_msg_get.\n- ceph: clear directory\u0027s completeness when creating file.\n- ceph: convert inline data to normal data before data write.\n- ceph: do not assume r_old_dentry[_dir] always set together.\n- ceph: do not chain inode updates to parent fsync.\n- ceph: do not grabs open file reference for aborted request.\n- ceph: do not include ceph.{file,dir}.layout vxattr in listxattr().\n- ceph: do not include used caps in cap_wanted.\n- ceph: do not invalidate page cache when inode is no longer used.\n- ceph: do not mark dirty caps when there is no auth cap.\n- ceph: do not pre-allocate space for cap release messages.\n- ceph: do not set r_old_dentry_dir on link().\n- ceph: do not trim auth cap when there are cap snaps.\n- ceph: do not zero i_wrbuffer_ref when reconnecting is denied.\n- ceph: drop cap releases in requests composed before cap reconnect.\n- ceph: drop extra open file reference in ceph_atomic_open().\n- ceph: drop unconnected inodes.\n- ceph: exclude setfilelock requests when calculating oldest tid.\n- ceph: export ceph_session_state_name function.\n- ceph: fetch inline data when getting Fcr cap refs.\n- ceph: fix __dcache_readdir().\n- ceph: fix a comment typo.\n- ceph: fix append mode write.\n- ceph: fix atomic_open snapdir.\n- ceph: fix bool assignments.\n- ceph: fix cache revoke race.\n- ceph: fix ceph_dir_llseek().\n- ceph: fix ceph_fh_to_parent().\n- ceph: fix ceph_removexattr().\n- ceph: fix ceph_set_acl().\n- ceph: fix ceph_writepages_start().\n- ceph: fix dcache/nocache mount option.\n- ceph: fix dentry leaks.\n- ceph: fix directory fsync.\n- ceph: fix divide-by-zero in __validate_layout().\n- ceph: fix double page_unlock() in page_mkwrite().\n- ceph: fix dout() compile warnings in ceph_filemap_fault().\n- ceph: fix file lock interruption.\n- ceph: fix flush tid comparision.\n- ceph: fix flushing caps.\n- ceph: fix llistxattr on symlink.\n- ceph: fix message length computation.\n- ceph: fix mksnap crash.\n- ceph: fix null pointer dereference in send_mds_reconnect().\n- ceph: fix pr_fmt() redefinition.\n- ceph: fix queuing inode to mdsdir\u0027s snaprealm.\n- ceph: fix reading inline data when i_size greater than PAGE_SIZE.\n- ceph: fix request time stamp encoding.\n- ceph: fix reset_readdir().\n- ceph: fix setting empty extended attribute.\n- ceph: fix sizeof(struct tYpO *) typo.\n- ceph: fix snap context leak in error path.\n- ceph: fix trim caps.\n- ceph: fix uninline data function.\n- ceph: flush cap release queue when trimming session caps.\n- ceph: flush inline version.\n- ceph: forbid mandatory file lock.\n- ceph: fscache: Update object store limit after file writing.\n- ceph: fscache: Wait for completion of object initialization.\n- ceph: fscache: add an interface to synchronize object store limit.\n- ceph: get inode size for each append write.\n- ceph: handle -ESTALE reply.\n- ceph: handle SESSION_FORCE_RO message.\n- ceph: handle cap export race in try_flush_caps().\n- ceph: handle cap import atomically.\n- ceph: handle frag mismatch between readdir request and reply.\n- ceph: handle race between cap reconnect and cap release.\n- ceph: handle session flush message.\n- ceph: hold on to exclusive caps on complete directories.\n- ceph: implement readv/preadv for sync operation.\n- ceph: improve readahead for file holes.\n- ceph: improve reference tracking for snaprealm.\n- ceph: include time stamp in every MDS request.\n- ceph: include time stamp in replayed MDS requests.\n- ceph: initial CEPH_FEATURE_FS_FILE_LAYOUT_V2 support.\n- ceph: initialize inode before instantiating dentry.\n- ceph: introduce a new inode flag indicating if cached dentries are ordered.\n- ceph: introduce ceph_fill_fragtree().\n- ceph: introduce global empty snap context.\n- ceph: invalidate dirty pages after forced umount.\n- ceph: keep i_snap_realm while there are writers.\n- ceph: kstrdup() memory handling.\n- ceph: let MDS adjust readdir \u0027frag\u0027.\n- ceph: make ceph_forget_all_cached_acls() static inline.\n- ceph: make fsync() wait unsafe requests that created/modified inode.\n- ceph: make sure syncfs flushes all cap snaps.\n- ceph: make sure write caps are registered with auth MDS.\n- ceph: match wait_for_completion_timeout return type.\n- ceph: message versioning fixes.\n- ceph: move ceph_find_inode() outside the s_mutex.\n- ceph: move spinlocking into ceph_encode_locks_to_buffer and ceph_count_locks.\n- ceph: no need to get parent inode in ceph_open.\n- ceph: parse inline data in MClientReply and MClientCaps.\n- ceph: pre-allocate ceph_cap struct for ceph_add_cap().\n- ceph: pre-allocate data structure that tracks caps flushing.\n- ceph: preallocate buffer for readdir reply.\n- ceph: print inode number for LOOKUPINO request.\n- ceph: properly apply umask when ACL is enabled.\n- ceph: properly handle XATTR_CREATE and XATTR_REPLACE.\n- ceph: properly mark empty directory as complete.\n- ceph: properly release page upon error.\n- ceph: properly zero data pages for file holes.\n- ceph: provide seperate {inode,file}_operations for snapdir.\n- ceph: queue cap release in __ceph_remove_cap().\n- ceph: queue vmtruncate if necessary when handing cap grant/revoke.\n- ceph: ratelimit warn messages for MDS closes session.\n- ceph: re-send AIO write request when getting -EOLDSNAP error.\n- ceph: re-send flushing caps (which are revoked) in reconnect stage.\n- ceph: re-send requests when MDS enters reconnecting stage.\n- ceph: refactor readpage_nounlock() to make the logic clearer.\n- ceph: remember subtree root dirfrag\u0027s auth MDS.\n- ceph: remove exported caps when handling cap import message.\n- ceph: remove outdated frag information.\n- ceph: remove redundant code for max file size verification.\n- ceph: remove redundant declaration.\n- ceph: remove redundant memset(0).\n- ceph: remove redundant test of head-\u003esafe and silence static analysis warnings.\n- ceph: remove the useless judgement.\n- ceph: remove unused functions in ceph_frag.h.\n- ceph: remove unused stringification macros.\n- ceph: remove useless ACL check.\n- ceph: remove xattr when null value is given to setxattr().\n- ceph: rename snapshot support.\n- ceph: replace comma with a semicolon.\n- ceph: request xattrs if xattr_version is zero.\n- ceph: reserve caps for file layout/lock MDS requests.\n- ceph: reset r_resend_mds after receiving -ESTALE.\n- ceph: return error for traceless reply race.\n- ceph: rework dcache readdir.\n- ceph: send TID of the oldest pending caps flush to MDS.\n- ceph: send client metadata to MDS.\n- ceph: set caps count after composing cap reconnect message.\n- ceph: set i_head_snapc when getting CEPH_CAP_FILE_WR reference.\n- ceph: set mds_wanted when MDS reply changes a cap to auth cap.\n- ceph: show nocephx_require_signatures and notcp_nodelay options.\n- ceph: show non-default options only.\n- ceph: simplify ceph_fh_to_dentry().\n- ceph: simplify two mount_timeout sites.\n- ceph: skip invalid dentry during dcache readdir.\n- ceph: support inline data feature.\n- ceph: switch some GFP_NOFS memory allocation to GFP_KERNEL.\n- ceph: sync read inline data.\n- ceph: take snap_rwsem when accessing snap realm\u0027s cached_context.\n- ceph: tolerate bad i_size for symlink inode (bsc#985232).\n- ceph: track pending caps flushing accurately.\n- ceph: track pending caps flushing globally.\n- ceph: trim unused inodes before reconnecting to recovering MDS.\n- ceph: trivial comment fix.\n- ceph: update i_max_size even if inode version does not change.\n- ceph: update inode fields according to issued caps.\n- ceph: use %zu for len in ceph_fill_inline_data().\n- ceph: use ceph_seq_cmp() to compare migrate_seq.\n- ceph: use empty snap context for uninline_data and get_pool_perm.\n- ceph: use fl-\u003efl_file as owner identifier of flock and posix lock.\n- ceph: use fl-\u003efl_type to decide flock operation.\n- ceph: use fpos_cmp() to compare dentry positions.\n- ceph: use getattr request to fetch inline data.\n- ceph: use i_size_{read,write} to get/set i_size.\n- ceph: use msecs_to_jiffies for time conversion.\n- ceph: use pagelist to present MDS request data.\n- ceph: use truncate_pagecache() instead of truncate_inode_pages().\n- ceph_sync_{,direct_}write: fix an oops on ceph_osdc_new_request() failure.\n- client: include kernel version in client metadata.\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- crush: add chooseleaf_stable tunable.\n- crush: decode and initialize chooseleaf_stable.\n- crush: ensure bucket id is valid before indexing buckets array.\n- crush: ensure take bucket value is valid.\n- crush: fix crash from invalid \u0027take\u0027 argument.\n- crush: sync up with userspace.\n- crypto: testmgr - allow rfc3686 aes-ctr variants in fips mode (bsc#958390).\n- crypto: testmgr - mark authenticated ctr(aes) also as FIPS able (bsc#958390).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- efifb: Fix KABI of screen_info struct (bsc#973499).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fs/ceph/debugfs.c: replace seq_printf by seq_puts.\n- fs/ceph: replace pr_warning by pr_warn.\n- hid-elo: kill not flush the work (bnc#982354).\n- hv: util: Pass the channel information during the init call (bnc#978527).\n- hv: utils: Invoke the poll function after handshake (bnc#978527).\n- hv: vmbus: Fix signaling logic in hv_need_to_signal_on_read().\n- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736).\n- kabi/severities: Allow changes in zpci_* symbols (bsc#974692)\n- kabi/severities: Whitelist libceph and rbd (bsc#964727).\n- kabi/severities: Whitelist libceph and rbd.\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kabi: protect struct fc_rport_priv (bsc#953233, bsc#962846).\n- kgraft/gfs2: Do not block livepatching in the log daemon for too long.\n- kgraft/xen: Do not block livepatching in the XEN blkif kthread.\n- libceph: Avoid holding the zero page on ceph_msgr_slab_init errors.\n- libceph: Fix ceph_tcp_sendpage()\u0027s more boolean usage.\n- libceph: MOSDOpReply v7 encoding.\n- libceph: Remove spurious kunmap() of the zero page.\n- libceph: a couple tweaks for wait loops.\n- libceph: add nocephx_sign_messages option.\n- libceph: advertise support for TUNABLES5.\n- libceph: advertise support for keepalive2.\n- libceph: allow setting osd_req_op\u0027s flags.\n- libceph: check data_len in -\u003ealloc_msg().\n- libceph: clear messenger auth_retry flag if we fault.\n- libceph: clear msg-\u003econ in ceph_msg_release() only.\n- libceph: do not access invalid memory in keepalive2 path.\n- libceph: do not spam dmesg with stray reply warnings.\n- libceph: drop authorizer check from cephx msg signing routines.\n- libceph: evaluate osd_req_op_data() arguments only once.\n- libceph: fix authorizer invalidation, take 2.\n- libceph: fix ceph_msg_revoke().\n- libceph: fix wrong name \u0027Ceph filesystem for Linux\u0027.\n- libceph: handle writefull for OSD op extent init (bsc#980706).\n- libceph: introduce ceph_x_authorizer_cleanup().\n- libceph: invalidate AUTH in addition to a service ticket.\n- libceph: kill off ceph_x_ticket_handler::validity.\n- libceph: move ceph_file_layout helpers to ceph_fs.h.\n- libceph: msg signing callouts do not need con argument.\n- libceph: nuke time_sub().\n- libceph: properly release STAT request\u0027s raw_data_in.\n- libceph: remove con argument in handle_reply().\n- libceph: remove outdated comment.\n- libceph: remove the unused macro AES_KEY_SIZE.\n- libceph: rename con_work() to ceph_con_workfn().\n- libceph: set \u0027exists\u0027 flag for newly up osd.\n- libceph: stop duplicating client fields in messenger.\n- libceph: store timeouts in jiffies, verify user input.\n- libceph: treat sockaddr_storage with uninitialized family as blank.\n- libceph: use keepalive2 to verify the mon session is alive.\n- libceph: use list_for_each_entry_safe.\n- libceph: use list_next_entry instead of list_entry_next.\n- libceph: use local variable cursor instead of msg-\u003ecursor.\n- libceph: use the right footer size when skipping a message.\n- libfc: replace \u0027rp_mutex\u0027 with \u0027rp_lock\u0027 (bsc#953233, bsc#962846).\n- md/raid56: Do not perform reads to support writes until stripe is ready.\n- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).\n- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.\n- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).\n- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).\n- md/raid5: always set conf-\u003eprev_chunk_sectors and -\u003eprev_algo (bsc#953048).\n- md/raid5: avoid races when changing cache size (bsc#953048).\n- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).\n- md/raid5: be more selective about distributing flags across batch (bsc#953048).\n- md/raid5: break stripe-batches when the array has failed (bsc#953048).\n- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).\n- md/raid5: change -\u003e\u003einactive_blocked to a bit-flag (bsc#953048).\n- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).\n- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).\n- md/raid5: close recently introduced race in stripe_head management.\n- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).\n- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).\n- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).\n- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).\n- md/raid5: do not let shrink_slab shrink too far (bsc#953048).\n- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).\n- md/raid5: ensure device failure recorded before write request returns (bsc#953048).\n- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).\n- md/raid5: fix allocation of \u0027scribble\u0027 array (bsc#953048).\n- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).\n- md/raid5: fix handling of degraded stripes in batches (bsc#953048).\n- md/raid5: fix init_stripe() inconsistencies (bsc#953048).\n- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).\n- md/raid5: fix newly-broken locking in get_active_stripe.\n- md/raid5: handle possible race as reshape completes (bsc#953048).\n- md/raid5: ignore released_stripes check (bsc#953048).\n- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).\n- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).\n- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).\n- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).\n- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).\n- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).\n- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).\n- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.\n- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).\n- md/raid5: remove incorrect \u0027min_t()\u0027 when calculating writepos (bsc#953048).\n- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).\n- md/raid5: separate large if clause out of fetch_block() (bsc#953048).\n- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).\n- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).\n- md/raid5: strengthen check on reshape_position at run (bsc#953048).\n- md/raid5: switch to use conf-\u003echunk_sectors in place of mddev-\u003echunk_sectors where possible (bsc#953048).\n- md/raid5: use -\u003elock to protect accessing raid5 sysfs attributes (bsc#953048).\n- md/raid5: use bio_list for the list of bios to return (bsc#953048).\n- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).\n- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).\n- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).\n- md: remove unwanted white space from md.c (bsc#953048).\n- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).\n- mds: check cap ID when handling cap export message.\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mmc: sdhci: Allow for irq being shared (bnc#977582).\n- mpt3sas: Fix use sas_is_tlr_enabled API before enabling MPI2_SCSIIO_CONTROL_TLR_ON flag (bsc#967640).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: do not poll the CQ from the kthread (bsc#975788, bsc#965087).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).\n- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).\n- powerpc/book3s64: Fix branching to OOL handlers in relocatable kernel (bsc@976821).\n- powerpc/book3s64: Remove __end_handlers marker (bsc#976821).\n- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).\n- raid5: Retry R5_ReadNoMerge flag when hit a read error.\n- raid5: add a new flag to track if a stripe can be batched (bsc#953048).\n- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).\n- raid5: avoid release list until last reference of the stripe (bsc#953048).\n- raid5: batch adjacent full stripe write (bsc#953048).\n- raid5: check faulty flag for array status during recovery (bsc#953048).\n- raid5: check_reshape() shouldn\u0027t call mddev_suspend (bsc#953048).\n- raid5: fix a race of stripe count check.\n- raid5: fix broken async operation chain (bsc#953048).\n- raid5: get_active_stripe avoids device_lock.\n- raid5: handle expansion/resync case with stripe batching (bsc#953048).\n- raid5: handle io error of batch list (bsc#953048).\n- raid5: make_request does less prepare wait.\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).\n- raid5: speedup sync_request processing (bsc#953048).\n- raid5: track overwrite disk count (bsc#953048).\n- raid5: update analysis state for failed stripe (bsc#953048).\n- raid5: use flex_array for scribble data (bsc#953048).\n- rbd: bump queue_max_segments.\n- rbd: delete an unnecessary check before rbd_dev_destroy().\n- rbd: do not free rbd_dev outside of the release callback.\n- rbd: do not put snap_context twice in rbd_queue_workfn().\n- rbd: drop null test before destroy functions.\n- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n- rbd: plug rbd_dev-\u003eheader.object_prefix memory leak.\n- rbd: rbd_wq comment is obsolete.\n- rbd: remove duplicate calls to rbd_dev_mapping_clear().\n- rbd: report unsupported features to syslog (bsc#979169).\n- rbd: return -ENOMEM instead of pool id if rbd_dev_create() fails.\n- rbd: set device_type::release instead of device::release.\n- rbd: set max_sectors explicitly.\n- rbd: store rbd_options in rbd_device.\n- rbd: terminate rbd_opts_tokens with Opt_err.\n- rbd: timeout watch teardown on unmap with mount_timeout.\n- rbd: use writefull op for object size writes.\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 6c6d86d3cdc26f7746fe4ba2bef8859b5aeb346c.\n- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).\n- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).\n- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).\n- s390/3270: fix view reference counting (bnc#979922, LTC#141736).\n- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).\n- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).\n- s390/pci: add extra padding to function measurement block (bnc#974692, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#974692, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#974692, LTC#139445).\n- s390/pci: remove pdev pointer from arch data (bnc#974692, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#974692, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#974692, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#974692, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#974692, LTC#139442).\n- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).\n- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).\n- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).\n- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).\n- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).\n- sb_edac: support for Broadwell -EP and -EX (bsc#979521).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- scsi-bnx2fc-handle_scsi_retry_delay\n- scsi-bnx2fc-soft_lockup_when_rmmod\n- scsi: Avoid crashing if device uses DIX but adapter does not support it (bsc#969016).\n- sd: get disk reference in sd_check_events() (bnc#897662).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- vgaarb: Add more context to error messages (bsc#976868).\n- wait: introduce wait_event_exclusive_cmd (bsc#953048).\n- x86 EDAC, sb_edac.c: Repair damage introduced when \u0027fixing\u0027 channel address (bsc#979521).\n- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xen/acpi: Disable ACPI table override when UEFI Secure Boot is enabled (bsc#970604).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2016-1133", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1937-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1937-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161937-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1937-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002171.html" }, { "category": "self", "summary": "SUSE Bug 662458", "url": "https://bugzilla.suse.com/662458" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 897662", "url": "https://bugzilla.suse.com/897662" }, { "category": "self", "summary": "SUSE Bug 928547", "url": "https://bugzilla.suse.com/928547" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 945345", "url": "https://bugzilla.suse.com/945345" }, { "category": "self", "summary": "SUSE Bug 947337", "url": "https://bugzilla.suse.com/947337" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 953048", "url": "https://bugzilla.suse.com/953048" }, { "category": "self", "summary": "SUSE Bug 953233", "url": "https://bugzilla.suse.com/953233" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957805", "url": "https://bugzilla.suse.com/957805" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 958390", "url": "https://bugzilla.suse.com/958390" }, { "category": "self", "summary": "SUSE Bug 958463", "url": "https://bugzilla.suse.com/958463" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 962742", "url": "https://bugzilla.suse.com/962742" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 964727", "url": "https://bugzilla.suse.com/964727" }, { "category": "self", "summary": "SUSE Bug 965087", "url": "https://bugzilla.suse.com/965087" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 968667", "url": "https://bugzilla.suse.com/968667" }, { "category": "self", "summary": "SUSE Bug 969016", "url": "https://bugzilla.suse.com/969016" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE Bug 970604", "url": "https://bugzilla.suse.com/970604" }, { "category": "self", "summary": "SUSE Bug 970609", "url": "https://bugzilla.suse.com/970609" }, { "category": "self", "summary": "SUSE Bug 970948", "url": "https://bugzilla.suse.com/970948" }, { "category": "self", "summary": "SUSE Bug 971049", "url": "https://bugzilla.suse.com/971049" }, { "category": "self", "summary": "SUSE Bug 971770", "url": "https://bugzilla.suse.com/971770" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 972124", "url": "https://bugzilla.suse.com/972124" }, { "category": "self", "summary": "SUSE Bug 972933", "url": "https://bugzilla.suse.com/972933" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973499", "url": "https://bugzilla.suse.com/973499" }, { "category": "self", "summary": "SUSE Bug 973570", "url": "https://bugzilla.suse.com/973570" }, { "category": "self", "summary": "SUSE Bug 974165", "url": "https://bugzilla.suse.com/974165" }, { "category": "self", "summary": "SUSE Bug 974308", "url": "https://bugzilla.suse.com/974308" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974692", "url": "https://bugzilla.suse.com/974692" }, { "category": "self", "summary": "SUSE Bug 975533", "url": "https://bugzilla.suse.com/975533" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975788", "url": "https://bugzilla.suse.com/975788" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976821", "url": "https://bugzilla.suse.com/976821" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 977417", "url": "https://bugzilla.suse.com/977417" }, { "category": "self", "summary": "SUSE Bug 977582", "url": "https://bugzilla.suse.com/977582" }, { "category": "self", "summary": "SUSE Bug 977685", "url": "https://bugzilla.suse.com/977685" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978469", "url": "https://bugzilla.suse.com/978469" }, { "category": "self", "summary": "SUSE Bug 978527", "url": "https://bugzilla.suse.com/978527" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979169", "url": "https://bugzilla.suse.com/979169" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979485", "url": "https://bugzilla.suse.com/979485" }, { "category": "self", "summary": "SUSE Bug 979489", "url": "https://bugzilla.suse.com/979489" }, { "category": "self", "summary": "SUSE Bug 979521", "url": "https://bugzilla.suse.com/979521" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979922", "url": "https://bugzilla.suse.com/979922" }, { "category": "self", "summary": "SUSE Bug 980246", "url": "https://bugzilla.suse.com/980246" }, { "category": "self", "summary": "SUSE Bug 980348", "url": "https://bugzilla.suse.com/980348" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980706", "url": "https://bugzilla.suse.com/980706" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981143", "url": "https://bugzilla.suse.com/981143" }, { "category": "self", "summary": "SUSE Bug 981344", "url": "https://bugzilla.suse.com/981344" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982354", "url": "https://bugzilla.suse.com/982354" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982698", "url": "https://bugzilla.suse.com/982698" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983318", "url": "https://bugzilla.suse.com/983318" }, { "category": "self", "summary": "SUSE Bug 983394", "url": "https://bugzilla.suse.com/983394" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983904", "url": "https://bugzilla.suse.com/983904" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984456", "url": "https://bugzilla.suse.com/984456" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 985232", "url": "https://bugzilla.suse.com/985232" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 988215", "url": "https://bugzilla.suse.com/988215" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE Bug 988552", "url": "https://bugzilla.suse.com/988552" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9717 page", "url": "https://www.suse.com/security/cve/CVE-2014-9717/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8551 page", "url": "https://www.suse.com/security/cve/CVE-2015-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8552 page", "url": "https://www.suse.com/security/cve/CVE-2015-8552/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8845 page", "url": "https://www.suse.com/security/cve/CVE-2015-8845/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2847 page", "url": "https://www.suse.com/security/cve/CVE-2016-2847/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3672 page", "url": "https://www.suse.com/security/cve/CVE-2016-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3707 page", "url": "https://www.suse.com/security/cve/CVE-2016-3707/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-02T11:06:46Z", "generator": { "date": "2016-08-02T11:06:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1937-1", "initial_release_date": "2016-08-02T11:06:46Z", "revision_history": [ { "date": "2016-08-02T11:06:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.61-60.18.1.noarch", "product": { "name": "kernel-devel-rt-3.12.61-60.18.1.noarch", "product_id": "kernel-devel-rt-3.12.61-60.18.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.61-60.18.1.noarch", "product": { "name": "kernel-source-rt-3.12.61-60.18.1.noarch", "product_id": "kernel-source-rt-3.12.61-60.18.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-base-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-base-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-base-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-base-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "product_id": "kernel-syms-rt-3.12.61-60.18.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.61-60.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.61-60.18.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch" }, "product_reference": "kernel-source-rt-3.12.61-60.18.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.61-60.18.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.61-60.18.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9717", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9717" } ], "notes": [ { "category": "general", "text": "fs/namespace.c in the Linux kernel before 4.0.2 processes MNT_DETACH umount2 system calls without verifying that the MNT_LOCKED flag is unset, which allows local users to bypass intended access restrictions and navigate to filesystem locations beneath a mount by calling umount2 within a user namespace.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9717", "url": "https://www.suse.com/security/cve/CVE-2014-9717" }, { "category": "external", "summary": "SUSE Bug 928547 for CVE-2014-9717", "url": "https://bugzilla.suse.com/928547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2014-9717" }, { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8551" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8551", "url": "https://www.suse.com/security/cve/CVE-2015-8551" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8551", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8551", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8551" }, { "cve": "CVE-2015-8552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8552" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8552", "url": "https://www.suse.com/security/cve/CVE-2015-8552" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8552", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8552", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8552" }, { "cve": "CVE-2015-8845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8845" } ], "notes": [ { "category": "general", "text": "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8845", "url": "https://www.suse.com/security/cve/CVE-2015-8845" }, { "category": "external", "summary": "SUSE Bug 975531 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975531" }, { "category": "external", "summary": "SUSE Bug 975533 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975533" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2015-8845" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2847", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2847" } ], "notes": [ { "category": "general", "text": "fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2847", "url": "https://www.suse.com/security/cve/CVE-2016-2847" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2847", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970948 for CVE-2016-2847", "url": "https://bugzilla.suse.com/970948" }, { "category": "external", "summary": "SUSE Bug 974646 for CVE-2016-2847", "url": "https://bugzilla.suse.com/974646" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-2847" }, { "cve": "CVE-2016-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3672" } ], "notes": [ { "category": "general", "text": "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3672", "url": "https://www.suse.com/security/cve/CVE-2016-3672" }, { "category": "external", "summary": "SUSE Bug 974308 for CVE-2016-3672", "url": "https://bugzilla.suse.com/974308" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-3672" }, { "cve": "CVE-2016-3707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3707" } ], "notes": [ { "category": "general", "text": "The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3707", "url": "https://www.suse.com/security/cve/CVE-2016-3707" }, { "category": "external", "summary": "SUSE Bug 980246 for CVE-2016-3707", "url": "https://bugzilla.suse.com/980246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-3707" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.61-60.18.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.61-60.18.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.61-60.18.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-02T11:06:46Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2017:1990-1
Vulnerability from csaf_suse
Published
2017-07-28 08:44
Modified
2017-07-28 08:44
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.74 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be 'jumped' over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010) (bnc#1039348).
- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354).
- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).
- CVE-2017-7346: The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate certain levels data, which allowed local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031796).
- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).
- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).
- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).
- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).
- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).
- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).
- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).
- CVE-2017-9150: The do_check function in kernel/bpf/verifier.c in the Linux kernel did not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allowed local users to obtain sensitive address information via crafted bpf system calls (bnc#1040279).
- CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).
- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).
- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52 (bnc#1030573).
- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls (bnc#1031579).
- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).
- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).
- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).
- CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006).
- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).
- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565).
- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).
- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).
- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. (bnc#1027066).
- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).
- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).
- CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel has incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179).
- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity (bnc#1008842).
- CVE-2017-2583: The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel improperly emulates a 'MOV SS, NULL selector' instruction, which allowed guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application (bnc#1020602).
- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).
- CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulates the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785).
- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).
- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).
- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).
- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bnc#1023762).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel did not set an errno value upon certain overflow detections, which allowed local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call (bnc#1021294).
- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. (bnc#1021258).
The following non-security bugs were fixed:
- 9p: fix a potential acl leak (4.4.68 stable queue).
- acpi / APEI: Add missing synchronize_rcu() on NOTIFY_SCI removal (bsc#1031717).
- acpi: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).
- acpi, ioapic: Clear on-stack resource before using it (bsc#1028819).
- acpi, nfit: fix acpi_nfit_flush_probe() crash (bsc#1031717).
- acpi, nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).
- acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717).
- acpi, nfit, libnvdimm: fix / harden ars_status output length handling (bsc#1023175).
- acpi, nfit: validate ars_status output buffer size (bsc#1023175).
- acpi: Remove platform devices from a bus on removal (bsc#1028819).
- acpi / scan: Drop support for force_remove (bnc#1029607).
- ahci: disable correct irq for dummy ports (bsc#1040125).
- alsa: hda - Fix deadlock of controller device lock at unbinding (4.4.68 stable queue).
- arm64: hugetlb: fix the wrong address for several functions (bsc#1032681).
- arm64: hugetlb: fix the wrong return value for huge_ptep_set_access_flags (bsc#1032681).
- arm64: hugetlb: remove the wrong pmd check in find_num_contig() (bsc#1032681).
- arm64/numa: fix incorrect log for memory-less node (bsc#1019631).
- arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- arm: 8452/3: PJ4: make coprocessor access sequences buildable in Thumb2 mode (4.4.68 stable queue).
- arm: OMAP5 / DRA7: Fix HYP mode boot for thumb2 build (4.4.68 stable queue).
- arm: Use full path in KBUILD_IMAGE definition (bsc#1010032).
- ASoC: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).
- ASoC: Intel: Skylake: Uninitialized variable in probe_codec() (bsc#1043231).
- ASoC: rt5640: use msleep() for long delays (bsc#1031717).
- ASoC: sti: Fix error handling if of_clk_get() fails (bsc#1031717).
- avoid including 'mountproto=' with no protocol in /proc/mounts (bsc#1019260).
- bcache: fix calling ida_simple_remove() with incorrect minor (bsc#1038085).
- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).
- bcache: partition support: add 16 minors per bcacheN device (bsc#1019784).
- blacklist 61e8a0d5a027 powerpc/pci: Fix endian bug in fixed PHB numbering (bsc#989311)
- blacklist.conf: a04a480d4392 net: Require exact match for TCP socket lookups if dif is l3mdev (v4.9-rc4) 10/11 conflicts are with code introduced by 74b20582ac38 ('net: l3mdev: Add hook in ip and ipv6', v4.7-rc1) which is not present in SP2. I think that either the problem was always there or was introduced by 74b20582ac38. If in the first case, the fix would have to be implemented differently; if in the second case, the fix is not needed in SP2.
- blacklist.conf: blacklist reverted commit Commit 82486aa6f1b9 ('ipv4: restore rt->fi for reference counting') was later reverted and replaced by commit 3fb07daff8e9 ('ipv4: add reference counting to metrics'). This solution breaks kABI, though, and I'll need to look into it more carefully to see if it can be worked around easily.
- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).
- blk-mq: Always schedule hctx->next_cpu (bsc#1020817).
- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).
- blk-mq: do not overwrite rq->mq_ctx (bsc#1020817).
- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).
- blk-mq: improve warning for running a queue on the wrong CPU (bsc#1020817).
- block: Change extern inline to static inline (bsc#1023175).
- block: copy NOMERGE flag from bio to request (bsc#1030070).
- block: get rid of blk_integrity_revalidate() (4.4.68 stable queue).
- bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).
- bna: add missing per queue ethtool stat (bsc#966321 FATE#320156).
- bna: avoid writing uninitialized data into hw registers (bsc#966321 FATE#320156).
- bna: integer overflow bug in debugfs (bsc#966321 FATE#320156).
- bnx2x: allow adding VLANs while interface is down (bsc#1027273).
- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).
- bnxt_en: allocate enough space for ->ntp_fltr_bmap (bsc#1020412 FATE#321671).
- bonding: avoid defaulting hard_header_len to ETH_HLEN on slave removal (bsc#1042286).
- bonding: do not use stale speed and duplex information (bsc#1042286).
- bonding: fix 802.3ad aggregator reselection (bsc#1029514).
- bonding: prevent out of bound accesses (bsc#1042286).
- bpf, arm64: fix jit branch offset related to ldimm64 (4.4.68 stable queue).
- brcmfmac: add fallback for devices that do not report per-chain values (bsc#1043231).
- brcmfmac: avoid writing channel out of allocated array (bsc#1043231).
- brcmfmac: Change error print on wlan0 existence (bsc#1000092).
- brcmfmac: Ensure pointer correctly set if skb data location changes (4.4.68 stable queue).
- brcmfmac: Make skb header writable before use (4.4.68 stable queue).
- brcmfmac: restore stopping netdev queue when bus clogs up (bsc#1031717).
- btrfs: add a flags field to btrfs_fs_info (bsc#1012452).
- btrfs: add ASSERT for block group's memory leak (bsc#1012452).
- btrfs: add btrfs_trans_handle->fs_info pointer (bsc#1012452).
- btrfs: add bytes_readonly to the spaceinfo at once (bsc#1012452).
- btrfs: add check to sysfs handler of label (bsc#1012452).
- btrfs: add dynamic debug support (bsc#1012452).
- btrfs: add error handling for extent buffer in print tree (bsc#1012452).
- btrfs: add missing bytes_readonly attribute file in sysfs (bsc#1012452).
- btrfs: add missing check for writeback errors on fsync (bsc#1012452).
- btrfs: add more validation checks for superblock (bsc#1012452).
- btrfs: Add ratelimit to btrfs printing (bsc#1012452).
- btrfs: add read-only check to sysfs handler of features (bsc#1012452).
- btrfs: add semaphore to synchronize direct IO writes with fsync (bsc#1012452).
- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).
- btrfs: add tracepoint for adding block groups (bsc#1012452).
- btrfs: add tracepoints for flush events (bsc#1012452).
- btrfs: add transaction space reservation tracepoints (bsc#1012452).
- btrfs: add validadtion checks for chunk loading (bsc#1012452).
- btrfs: add write protection to SET_FEATURES ioctl (bsc#1012452).
- btrfs: allow balancing to dup with multi-device (bsc#1012452).
- btrfs: allow unlink to exceed subvolume quota (bsc#1019614).
- btrfs: always reserve metadata for delalloc extents (bsc#1012452).
- btrfs: always use trans->block_rsv for orphans (bsc#1012452).
- btrfs: avoid blocking open_ctree from cleaner_kthread (bsc#1012452).
- btrfs: avoid deadlocks during reservations in btrfs_truncate_block (bsc#1012452).
- btrfs: avoid overflowing f_bfree (bsc#1012452).
- btrfs: avoid uninitialized variable warning (bsc#1012452).
- btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641).
- btrfs: btrfs_abort_transaction, drop root parameter (bsc#1012452).
- btrfs: __btrfs_buffered_write: Pass valid file offset when releasing delalloc space (bsc#1012452).
- btrfs: __btrfs_buffered_write: Reserve/release extents aligned to block size (bsc#1012452).
- btrfs: btrfs_check_super_valid: Allow 4096 as stripesize (bsc#1012452).
- btrfs: btrfs_debug should consume fs_info when DEBUG is not defined (bsc#1012452).
- btrfs: btrfs_ioctl_clone: Truncate complete page after performing clone operation (bsc#1012452).
- btrfs: btrfs_page_mkwrite: Reserve space in sectorsized units (bsc#1012452).
- btrfs: btrfs_relocate_chunk pass extent_root to btrfs_end_transaction (bsc#1012452).
- btrfs: btrfs_submit_direct_hook: Handle map_length < bio vector length (bsc#1012452).
- btrfs: build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: change BUG_ON()'s to ASSERT()'s in backref_cache_cleanup() (bsc#1012452).
- btrfs: change delayed reservation fallback behavior (bsc#1012452).
- btrfs: change how we calculate the global block rsv (bsc#1012452).
- btrfs: change how we update the global block rsv (bsc#1012452).
- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1019614).
- btrfs: check btree node's nritems (bsc#1012452).
- btrfs: check if extent buffer is aligned to sectorsize (bsc#1012452).
- btrfs: check inconsistence between chunk and block group (bsc#1012452).
- btrfs: check reserved when deciding to background flush (bsc#1012452).
- btrfs: clarify do_chunk_alloc()'s return value (bsc#1012452).
- btrfs: Clean pte corresponding to page straddling i_size (bsc#1012452).
- btrfs: clean the old superblocks before freeing the device (bsc#1012452).
- btrfs: clean up and optimize __check_raid_min_device() (bsc#1012452).
- btrfs: cleanup assigning next active device with a check (bsc#1012452).
- btrfs: cleanup BUG_ON in merge_bio (bsc#1012452).
- btrfs: Cleanup compress_file_range() (bsc#1012452).
- btrfs: cleanup error handling in extent_write_cached_pages (bsc#1012452).
- btrfs: clear uptodate flags of pages in sys_array eb (bsc#1012452).
- btrfs: clone: use vmalloc only as fallback for nodesize bufer (bsc#1012452).
- btrfs: Compute and look up csums based on sectorsized blocks (bsc#1012452).
- btrfs: convert nodesize macros to static inlines (bsc#1012452).
- btrfs: convert printk(KERN_* to use pr_* calls (bsc#1012452).
- btrfs: convert pr_* to btrfs_* where possible (bsc#1012452).
- btrfs: convert send's verbose_printk to btrfs_debug (bsc#1012452).
- btrfs: copy_to_sk drop unused root parameter (bsc#1012452).
- btrfs: create a helper function to read the disk super (bsc#1012452).
- btrfs: create example debugfs file only in debugging build (bsc#1012452).
- btrfs: create helper btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: create helper function __check_raid_min_devices() (bsc#1012452).
- btrfs: csum_tree_block: return proper errno value (bsc#1012452).
- btrfs: detect corruption when non-root leaf has zero item (bsc#1012452).
- btrfs: device add and remove: use GFP_KERNEL (bsc#1012452).
- btrfs: Direct I/O read: Work on sectorsized blocks (bsc#1012452).
- btrfs: divide btrfs_update_reserved_bytes() into two functions (bsc#1012452).
- btrfs: do not background blkdev_put() (bsc#1012452).
- btrfs: do not bother kicking async if there's nothing to reclaim (bsc#1012452).
- btrfs: do not BUG_ON() in btrfs_orphan_add (bsc#1012452).
- btrfs: do not create empty block group if we have allocated data (bsc#1012452).
- btrfs: do not decrease bytes_may_use when replaying extents (bsc#1012452).
- btrfs: do not do nocow check unless we have to (bsc#1012452).
- btrfs: do not do unnecessary delalloc flushes when relocating (bsc#1012452).
- btrfs: do not force mounts to wait for cleaner_kthread to delete one or more subvolumes (bsc#1012452).
- btrfs: do not wait for unrelated IO to finish before relocation (bsc#1012452).
- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1035866).
- btrfs: do not write corrupted metadata blocks to disk (bsc#1012452).
- btrfs: end transaction if we abort when creating uuid root (bsc#1012452).
- btrfs: enhance btrfs_find_device_by_user_input() to check device path (bsc#1012452).
- btrfs: error out if generic_bin_search get invalid arguments (bsc#1012452).
- btrfs: expand cow_file_range() to support in-band dedup and subpage-blocksize (bsc#1012452).
- btrfs: extend btrfs_set_extent_delalloc and its friends to support in-band dedupe and subpage size patchset (bsc#1012452).
- btrfs: extent same: use GFP_KERNEL for page array allocations (bsc#1012452).
- btrfs: fallback to vmalloc in btrfs_compare_tree (bsc#1012452).
- btrfs: fallocate: use GFP_KERNEL (bsc#1012452).
- btrfs: fallocate: Work with sectorsized blocks (bsc#1012452).
- btrfs: fill relocation block rsv after allocation (bsc#1012452).
- btrfs: fix an integer overflow check (bsc#1012452).
- btrfs: fix a possible umount deadlock (bsc#1012452).
- btrfs: Fix block size returned to user space (bsc#1012452).
- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).
- btrfs: fix btrfs_no_printk stub helper (bsc#1012452).
- btrfs: Fix BUG_ON condition in scrub_setup_recheck_block() (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_mark_buffer_dirty (bsc#1012452).
- btrfs: fix BUG_ON in btrfs_submit_compressed_write (bsc#1012452).
- btrfs: fix build warning (bsc#1012452).
- btrfs: fix callers of btrfs_block_rsv_migrate (bsc#1012452).
- btrfs: fix check_direct_IO() for non-iovec iterators (bsc#1012452).
- btrfs: fix check_shared for fiemap ioctl (bsc#1037177).
- btrfs: fix crash when tracepoint arguments are freed by wq callbacks (bsc#1012452).
- btrfs: fix data loss after truncate when using the no-holes feature (bsc#1036214).
- btrfs: fix deadlock in delayed_ref_async_start (bsc#1012452).
- btrfs: fix delalloc accounting after copy_from_user faults (bsc#1012452).
- btrfs: fix delalloc reservation amount tracepoint (bsc#1012452).
- btrfs: fix disk_i_size update bug when fallocate() fails (bsc#1012452).
- btrfs: fix divide error upon chunk's stripe_len (bsc#1012452).
- btrfs: fix double free of fs root (bsc#1012452).
- btrfs: fix eb memory leak due to readpage failure (bsc#1012452).
- btrfs: fix em leak in find_first_block_group (bsc#1012452).
- btrfs: fix emptiness check for dirtied extent buffers at check_leaf() (bsc#1012452).
- btrfs: fix error handling in map_private_extent_buffer (bsc#1012452).
- btrfs: fix error return code in btrfs_init_test_fs() (bsc#1012452).
- btrfs: fix extent_same allowing destination offset beyond i_size (bsc#1012452).
- btrfs: fix free space calculation in dump_space_info() (bsc#1012452).
- btrfs: fix fsfreeze hang caused by delayed iputs deal (bsc#1012452).
- btrfs: fix fspath error deallocation (bsc#1012452).
- btrfs: fix handling of faults from btrfs_copy_from_user (bsc#1012452).
- btrfs: fix inode leak on failure to setup whiteout inode in rename (bsc#1020975).
- btrfs: fix int32 overflow in shrink_delalloc() (bsc#1012452).
- btrfs: Fix integer overflow when calculating bytes_per_bitmap (bsc#1012452).
- btrfs: fix invalid dereference in btrfs_retry_endio (bsc#1040395).
- btrfs: fix invalid reference in replace_path (bsc#1012452).
- btrfs: fix listxattrs not listing all xattrs packed in the same item (bsc#1012452).
- btrfs: fix lockdep deadlock warning due to dev_replace (bsc#1012452).
- btrfs: fix lockdep warning about log_mutex (bsc#1021455).
- btrfs: fix lock dep warning, move scratch dev out of device_list_mutex and uuid_mutex (bsc#1012452).
- btrfs: fix lock dep warning move scratch super outside of chunk_mutex (bsc#1012452).
- btrfs: fix lockdep warning on deadlock against an inode's log mutex (bsc#1021455).
- btrfs: fix __MAX_CSUM_ITEMS (bsc#1012452).
- btrfs: fix memory leak during RAID 5/6 device replacement (bsc#1012452).
- btrfs: fix memory leak of block group cache (bsc#1012452).
- btrfs: fix memory leak of reloc_root (bsc#1012452).
- btrfs: fix mixed block count of available space (bsc#1012452).
- btrfs: fix number of transaction units for renames with whiteout (bsc#1020975).
- btrfs: fix one bug that process may endlessly wait for ticket in wait_reserve_ticket() (bsc#1012452).
- btrfs: fix panic in balance due to EIO (bsc#1012452).
- btrfs: fix race between block group relocation and nocow writes (bsc#1012452).
- btrfs: fix race between device replace and block group removal (bsc#1012452).
- btrfs: fix race between device replace and chunk allocation (bsc#1012452).
- btrfs: fix race between device replace and discard (bsc#1012452).
- btrfs: fix race between device replace and read repair (bsc#1012452).
- btrfs: fix race between fsync and direct IO writes for prealloc extents (bsc#1012452).
- btrfs: fix race between readahead and device replace/removal (bsc#1012452).
- btrfs: fix race setting block group back to RW mode during device replace (bsc#1012452).
- btrfs: fix race setting block group readonly during device replace (bsc#1012452).
- btrfs: fix read_node_slot to return errors (bsc#1012452).
- btrfs: fix release reserved extents trace points (bsc#1012452).
- btrfs: fix segmentation fault when doing dio read (bsc#1040425).
- btrfs: Fix slab accounting flags (bsc#1012452).
- btrfs: fix truncate_space_check (bsc#1012452).
- btrfs: fix unexpected return value of fiemap (bsc#1012452).
- btrfs: fix unprotected assignment of the left cursor for device replace (bsc#1012452).
- btrfs: fix WARNING in btrfs_select_ref_head() (bsc#1012452).
- btrfs: flush_space: treat return value of do_chunk_alloc properly (bsc#1012452).
- btrfs: Force stripesize to the value of sectorsize (bsc#1012452).
- btrfs: free sys_array eb as soon as possible (bsc#1012452).
- btrfs: GFP_NOFS does not GFP_HIGHMEM (bsc#1012452).
- btrfs: Handle uninitialised inode eviction (bsc#1012452).
- btrfs: hide test-only member under ifdef (bsc#1012452).
- btrfs: improve check_node to avoid reading corrupted nodes (bsc#1012452).
- btrfs: Improve FL_KEEP_SIZE handling in fallocate (bsc#1012452).
- btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325).
- btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325).
- btrfs: introduce BTRFS_MAX_ITEM_SIZE (bsc#1012452).
- btrfs: introduce device delete by devid (bsc#1012452).
- btrfs: introduce raid-type to error-code table, for minimum device constraint (bsc#1012452).
- btrfs: introduce ticketed enospc infrastructure (bsc#1012452).
- btrfs: introduce tickets_id to determine whether asynchronous metadata reclaim work makes progress (bsc#1012452).
- btrfs: ioctl: reorder exclusive op check in RM_DEV (bsc#1012452).
- btrfs: kill BUG_ON in do_relocation (bsc#1012452).
- btrfs: kill BUG_ON in run_delayed_tree_ref (bsc#1012452).
- btrfs: kill BUG_ON()'s in btrfs_mark_extent_written (bsc#1012452).
- btrfs: kill invalid ASSERT() in process_all_refs() (bsc#1012452).
- btrfs: kill the start argument to read_extent_buffer_pages (bsc#1012452).
- btrfs: kill unused writepage_io_hook callback (bsc#1012452).
- btrfs: let callers of btrfs_alloc_root pass gfp flags (bsc#1012452).
- btrfs: Limit inline extents to root->sectorsize (bsc#1012452).
- btrfs: make find_workspace always succeed (bsc#1012452).
- btrfs: make find_workspace warn if there are no workspaces (bsc#1012452).
- btrfs: make mapping->writeback_index point to the last written page (bsc#1012452).
- btrfs: make state preallocation more speculative in __set_extent_bit (bsc#1012452).
- btrfs: make sure device is synced before return (bsc#1012452).
- btrfs: make sure we stay inside the bvec during __btrfs_lookup_bio_sums (bsc#1012452).
- btrfs: make use of btrfs_find_device_by_user_input() (bsc#1012452).
- btrfs: make use of btrfs_scratch_superblocks() in btrfs_rm_device() (bsc#1012452).
- btrfs: memset to avoid stale content in btree leaf (bsc#1012452).
- btrfs: memset to avoid stale content in btree node block (bsc#1012452).
- btrfs: move error handling code together in ctree.h (bsc#1012452).
- btrfs: optimize check for stale device (bsc#1012452).
- btrfs: Output more info for enospc_debug mount option (bsc#1012452).
- btrfs: parent_start initialization cleanup (bsc#1012452).
- btrfs: pass correct args to btrfs_async_run_delayed_refs() (bsc#1012452).
- btrfs: pass number of devices to btrfs_check_raid_min_devices (bsc#1012452).
- btrfs: pass the right error code to the btrfs_std_error (bsc#1012452).
- btrfs: pin log earlier when renaming (bsc#1020975).
- btrfs: pin logs earlier when doing a rename exchange operation (bsc#1020975).
- btrfs: preallocate compression workspaces (bsc#1012452).
- btrfs: Print Warning only if ENOSPC_DEBUG is enabled (bsc#1012452).
- btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461).
- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614).
- btrfs: Ratelimit 'no csum found' info message (bsc#1012452).
- btrfs: reada: add all reachable mirrors into reada device list (bsc#1012452).
- btrfs: reada: Add missed segment checking in reada_find_zone (bsc#1012452).
- btrfs: reada: Avoid many times of empty loop (bsc#1012452).
- btrfs: reada: avoid undone reada extents in btrfs_reada_wait (bsc#1012452).
- btrfs: reada: bypass adding extent when all zone failed (bsc#1012452).
- btrfs: reada: Fix a debug code typo (bsc#1012452).
- btrfs: reada: Fix in-segment calculation for reada (bsc#1012452).
- btrfs: reada: ignore creating reada_extent for a non-existent device (bsc#1012452).
- btrfs: reada: Jump into cleanup in direct way for __readahead_hook() (bsc#1012452).
- btrfs: reada: limit max works count (bsc#1012452).
- btrfs: reada: Move is_need_to_readahead contition earlier (bsc#1012452).
- btrfs: reada: move reada_extent_put to place after __readahead_hook() (bsc#1012452).
- btrfs: reada: Pass reada_extent into __readahead_hook directly (bsc#1012452).
- btrfs: reada: reduce additional fs_info->reada_lock in reada_find_zone (bsc#1012452).
- btrfs: reada: Remove level argument in severial functions (bsc#1012452).
- btrfs: reada: simplify dev->reada_in_flight processing (bsc#1012452).
- btrfs: reada: Use fs_info instead of root in __readahead_hook's argument (bsc#1012452).
- btrfs: reada: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: readdir: use GFP_KERNEL (bsc#1012452).
- btrfs: refactor btrfs_dev_replace_start for reuse (bsc#1012452).
- btrfs: Refactor btrfs_lock_cluster() to kill compiler warning (bsc#1012452).
- btrfs: remove BUG() in raid56 (bsc#1012452).
- btrfs: remove BUG_ON in start_transaction (bsc#1012452).
- btrfs: remove BUG_ON()'s in btrfs_map_block (bsc#1012452).
- btrfs: remove build fixup for qgroup_account_snapshot (bsc#1012452).
- btrfs: remove redundant error check (bsc#1012452).
- btrfs: remove save_error_info() (bsc#1012452).
- btrfs: remove unnecessary btrfs_mark_buffer_dirty in split_leaf (bsc#1012452).
- btrfs: remove unused function btrfs_assert() (bsc#1012452).
- btrfs: rename and document compression workspace members (bsc#1012452).
- btrfs: rename btrfs_find_device_by_user_input (bsc#1012452).
- btrfs: rename btrfs_std_error to btrfs_handle_fs_error (bsc#1012452).
- btrfs: rename __check_raid_min_devices (bsc#1012452).
- btrfs: rename flags for vol args v2 (bsc#1012452).
- btrfs: reorg btrfs_close_one_device() (bsc#1012452).
- btrfs: Replace -ENOENT by -ERANGE in btrfs_get_acl() (bsc#1012452).
- btrfs: Reset IO error counters before start of device replacing (bsc#1012452).
- btrfs: reuse existing variable in scrub_stripe, reduce stack usage (bsc#1012452).
- btrfs: s_bdev is not null after missing replace (bsc#1012452).
- btrfs: scrub: Set bbio to NULL before calling btrfs_map_block (bsc#1012452).
- btrfs: scrub: use GFP_KERNEL on the submission path (bsc#1012452).
- btrfs: Search for all ordered extents that could span across a page (bsc#1012452).
- btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325).
- btrfs: send: silence an integer overflow warning (bsc#1012452).
- btrfs: send: use GFP_KERNEL everywhere (bsc#1012452).
- btrfs: send: use temporary variable to store allocation size (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_roots (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for clone_sources_tmp (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for read_buf (bsc#1012452).
- btrfs: send: use vmalloc only as fallback for send_buf (bsc#1012452).
- btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015)
- btrfs: Simplify conditions about compress while mapping btrfs flags to inode flags (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to clear_extent_dirty (bsc#1012452).
- btrfs: sink gfp parameter to clear_record_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to convert_extent_bit (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_bits (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_defrag (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_delalloc (bsc#1012452).
- btrfs: sink gfp parameter to set_extent_new (bsc#1012452).
- btrfs: sink gfp parameter to set_record_extent_bits (bsc#1012452).
- btrfs: skip commit transaction if we do not have enough pinned bytes (bsc#1037186).
- btrfs: subpage-blocksize: Rate limit scrub error message (bsc#1012452).
- btrfs: switch to common message helpers in open_ctree, adjust messages (bsc#1012452).
- btrfs: switch to kcalloc in btrfs_cmp_data_prepare (bsc#1012452).
- btrfs: sysfs: protect reading label by lock (bsc#1012452).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: trace pinned extents (bsc#1012452).
- btrfs: track transid for delayed ref flushing (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, document subvol flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move balance flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move BTRFS_LABEL_SIZE (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move feature flags (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, move struct btrfs_ioctl_defrag_range_args (bsc#1012452).
- btrfs: uapi/linux/btrfs.h migration, qgroup limit flags (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h migration, item types and defines (bsc#1012452).
- btrfs: uapi/linux/btrfs_tree.h, use __u8 and __u64 (bsc#1012452).
- btrfs: unpin log if rename operation fails (bsc#1020975).
- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).
- btrfs: unsplit printed strings (bsc#1012452).
- btrfs: untangle gotos a bit in __clear_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in convert_extent_bit (bsc#1012452).
- btrfs: untangle gotos a bit in __set_extent_bit (bsc#1012452).
- btrfs: update btrfs_space_info's bytes_may_use timely (bsc#1012452).
- btrfs: Use correct format specifier (bsc#1012452).
- btrfs: use correct offset for reloc_inode in prealloc_file_extent_cluster() (bsc#1012452).
- btrfs: use dynamic allocation for root item in create_subvol (bsc#1012452).
- btrfs: Use (eb->start, seq) as search key for tree modification log (bsc#1012452).
- btrfs: use existing device constraints table btrfs_raid_array (bsc#1012452).
- btrfs: use FLUSH_LIMIT for relocation in reserve_metadata_bytes (bsc#1012452).
- btrfs: use fs_info directly (bsc#1012452).
- btrfs: use new error message helper in qgroup_account_snapshot (bsc#1012452).
- btrfs: use proper type for failrec in extent_state (bsc#1012452).
- btrfs: use root when checking need_async_flush (bsc#1012452).
- btrfs: use the correct struct for BTRFS_IOC_LOGICAL_INO (bsc#1012452).
- btrfs: Use __u64 in exported linux/btrfs.h (bsc#1012452).
- btrfs: warn_on for unaccounted spaces (bsc#1012452).
- ceph: check i_nlink while converting a file handle to dentry (bsc#1039864).
- ceph: Check that the new inode size is within limits in ceph_fallocate() (bsc#1037969).
- ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).
- ceph: fix bad endianness handling in parse_reply_info_extra (bsc#1020488).
- ceph: fix file open flags on ppc64 (bsc#1022266).
- ceph: fix memory leak in __ceph_setxattr() (bsc#1036763).
- ceph: fix potential use-after-free (bsc#1043371).
- ceph: fix recursively call between ceph_set_acl and __ceph_setattr (bsc#1034902).
- ceph: memory leak in ceph_direct_read_write callback (bsc#1041810).
- cfq-iosched: fix the delay of cfq_group's vdisktime under iops mode (bsc#1012829).
- cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831).
- cgroup: remove redundant cleanup in css_create (bsc#1012829).
- cifs: backport prepath matching fix (bsc#799133).
- cifs: small underflow in cnvrtDosUnixTm() (bnc#1043935).
- clk: Make x86/ conditional on CONFIG_COMMON_CLK (4.4.68 stable queue).
- clk: xgene: Add PMD clock (bsc#1019351).
- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).
- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).
- config: enable Ceph kernel client modules for ppc64le (fate#321098)
- config: enable Ceph kernel client modules for s390x (fate#321098)
- cpupower: Fix turbo frequency reporting for pre-Sandy Bridge cores (4.4.68 stable queue).
- crypto: algif_aead - Require setkey before accept(2) (bsc#1031717).
- crypto: algif_hash - avoid zero-sized array (bnc#1007962).
- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).
- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).
- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).
- crypto: qat - fix bar discovery for c62x (bsc#1021251).
- crypto: qat - zero esram only for DH85x devices (1021248).
- crypto: rsa - allow keys >= 2048 bits in FIPS mode (bsc#1018913).
- crypto: sha-mb - Fix load failure (bsc#1037384).
- crypto: xts - consolidate sanity check for keys (bsc#1018913).
- crypto: xts - fix compile errors (bsc#1018913).
- cxgb4: Add control net_device for configuring PCIe VF (bsc#1021424).
- cxgb4: Add llseek operation for flash debugfs entry (bsc#1021424).
- cxgb4: add new routine to get adapter info (bsc#1021424).
- cxgb4: Add PCI device ID for new adapter (bsc#1021424).
- cxgb4: Add port description for new cards (bsc#1021424).
- cxgb4: Add support to enable logging of firmware mailbox commands (bsc#1021424).
- cxgb4: Check for firmware errors in the mailbox command loop (bsc#1021424).
- cxgb4: correct device ID of T6 adapter (bsc#1021424).
- cxgb4/cxgb4vf: Add set VF mac address support (bsc#1021424).
- cxgb4/cxgb4vf: Allocate more queues for 25G and 100G adapter (bsc#1021424).
- cxgb4/cxgb4vf: Assign netdev->dev_port with port ID (bsc#1021424).
- cxgb4/cxgb4vf: Display 25G and 100G link speed (bsc#1021424).
- cxgb4/cxgb4vf: Remove deprecated module parameters (bsc#1021424).
- cxgb4: DCB message handler needs to use correct portid to netdev mapping (bsc#1021424).
- cxgb4: Decode link down reason code obtained from firmware (bsc#1021424).
- cxgb4: Do not assume FW_PORT_CMD reply is always port info msg (bsc#1021424).
- cxgb4: do not call napi_hash_del() (bsc#1021424).
- cxgb4: Do not sleep when mbox cmd is issued from interrupt context (bsc#1021424).
- cxgb4: Enable SR-IOV configuration via PCI sysfs interface (bsc#1021424).
- cxgb4: Fix issue while re-registering VF mgmt netdev (bsc#1021424).
- cxgb4: MU requested by Chelsio (bsc#1021424).
- cxgb4: Properly decode port module type (bsc#1021424).
- cxgb4: Refactor t4_port_init function (bsc#1021424).
- cxgb4: Reset dcb state machine and tx queue prio only if dcb is enabled (bsc#1021424).
- cxgb4: Support compressed error vector for T6 (bsc#1021424).
- cxgb4: Synchronize access to mailbox (bsc#1021424).
- cxgb4: update latest firmware version supported (bsc#1021424).
- cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).
- dax: fix deadlock with DAX 4k holes (bsc#1012829).
- dax: fix device-dax region base (bsc#1023175).
- Delete previous two fixes for i915 (bsc#1019061). These upstream fixes brought some regressions, so better to revert for now.
- dell-laptop: Adds support for keyboard backlight timeout AC settings (bsc#1013561).
- device-dax: check devm_nsio_enable() return value (bsc#1023175).
- device-dax: fail all private mapping attempts (bsc#1023175).
- device-dax: fix percpu_ref_exit ordering (bsc#1023175).
- device-dax: fix private mapping restriction, permit read-only (bsc#1031717).
- Disable CONFIG_POWER_SUPPLY_DEBUG in debug kernel (bsc#1031500).
- dmaengine: dw: fix typo in Kconfig (bsc#1031717).
- dm: fix dm_target_io leak if clone_bio() returns an error (bsc#1040125).
- dm-mpath: fix race window in do_end_io() (bsc#1011044).
- dm round robin: do not use this_cpu_ptr() without having preemption disabled (bsc#1040125).
- dm verity fec: fix block calculation (bsc#1040125).
- dm verity fec: fix bufio leaks (bsc#1040125).
- dm verity fec: limit error correction recursion (bsc#1040125).
- drivers: base: dma-mapping: Fix typo in dmam_alloc_non_coherent comments (bsc#1031717).
- drivers: hv: util: do not forget to init host_ts.lock (bsc#1031206).
- drivers: hv: vmbus: finally fix hv_need_to_signal_on_read() (fate#320485, bug#1018385).
- drivers: hv: vmbus: Prevent sending data on a rescinded channel (fate#320485, bug#1028217).
- drivers: hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (fate#320485, bsc#1023287, bsc#1028217).
- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).
- drivers: net: phy: xgene: Fix 'remove' function (bsc#1019351).
- drivers: net: xgene: Add change_mtu function (bsc#1019351).
- drivers: net: xgene: Add flow control configuration (bsc#1019351).
- drivers: net: xgene: Add flow control initialization (bsc#1019351).
- drivers: net: xgene: Add helper function (bsc#1019351).
- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).
- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).
- drivers: net: xgene: fix build after change_mtu function change (bsc#1019351).
- drivers: net: xgene: fix: Coalescing values for v2 hardware (bsc#1019351).
- drivers: net: xgene: fix: Disable coalescing on v1 hardware (bsc#1019351).
- drivers: net: xgene: Fix MSS programming (bsc#1019351).
- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).
- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).
- drivers: net: xgene: uninitialized variable in xgene_enet_free_pagepool() (bsc#1019351).
- drivers/tty: 8250: only call fintek_8250_probe when doing port I/O (bsc#1031717).
- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).
- drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913).
- drm/i915: Disable tv output on i9x5gm (bsc#1039700).
- drm/i915: Do not init hpd polling for vlv and chv from runtime_suspend() (bsc#1014120).
- drm/i915: Do not touch NULL sg on i915_gem_object_get_pages_gtt() error (bsc#1031717).
- drm-i915-dp-Restore-PPS-HW-state-from-the-encoder-re
- drm/i915/dp: Restore PPS HW state from the encoder resume hook (bsc#1019061).
- drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634).
- drm/i915: Fix mismatched INIT power domain disabling during suspend (bsc#1031717).
- drm/i915: Fix watermarks for VLV/CHV (bsc#1011176).
- drm/i915: Force VDD off on the new power seqeuencer before starting to use it (bsc#1009674).
- drm/i915/gen9: Fix PCODE polling during CDCLK change notification (bsc#1015367).
- drm/i915: Introduce Kabypoint PCH for Kabylake H/DT (bsc#1032581).
- drm/i915: Listen for PMIC bus access notifications (bsc#1011913).
- drm/i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).
- drm/i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).
- drm/i915: Nuke debug messages from the pipe update critical section (bsc#1031717).
- drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717).
- drm-i915-Prevent-PPS-stealing-from-a-normal-DP-port
- drm/i915: Prevent PPS stealing from a normal DP port on VLV/CHV (bsc#1019061).
- drm/i915: Program iboost settings for HDMI/DVI on SKL (bsc#1031717).
- drm/i915: relax uncritical udelay_range() (bsc#1031717).
- drm/i915: relax uncritical udelay_range() settings (bsc#1031717).
- drm/i915: Use pagecache write to prepopulate shmemfs from pwrite-ioctl (bsc#1040463).
- drm/i915/vlv: Prevent enabling hpd polling in late suspend (bsc#1014120).
- drm/i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).
- drm/mgag200: Added support for the new device G200eH3 (bsc#1007959, fate#322780)
- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).
- drm/nouveau/tmr: fully separate alarm execution/pending lists (bsc#1043467).
- drm/ttm: fix use-after-free races in vm fault handling (4.4.68 stable queue).
- drm/vc4: Fix an integer overflow in temporary allocation layout (bsc#1021294).
- drm-vc4-Fix-an-integer-overflow-in-temporary-allocation-layout.patch
- drm/vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).
- drm-vc4-Return-EINVAL-on-the-overflow-checks-failing.patch
- drm: virtio-gpu: get the fb from the plane state for atomic updates (bsc#1023101).
- e1000e: Do not return uninitialized stats (bug#1034635).
- edac, xgene: Fix spelling mistake in error messages (bsc#1019351).
- efi: Do not issue error message when booted under Xen (bnc#1036638).
- enic: set skb->hash type properly (bsc#922871 fate#318754).
- ext4: fix data corruption for mmap writes (bsc#1012829).
- ext4: fix data corruption with EXT4_GET_BLOCKS_ZERO (bsc#1012829).
- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).
- ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).
- f2fs: fix bad prefetchw of NULL page (bsc#1012829).
- f2fs: sanity check segment count (4.4.68 stable queue).
- Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch (bsc#982783,bsc#998106,bsc#1020048).
- fnic: Return 'DID_IMM_RETRY' if rport is not ready (bsc#1035920).
- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).
- fs: fix data invalidation in the cleancache during direct IO (git-fixes).
- fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).
- ftrace: Make ftrace_location_range() global (FATE#322421).
- fuse: fix clearing suid, sgid for chown() (bsc#1012829).
- futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755).
- futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755).
- gpio: xgene: make explicitly non-modular (bsc#1019351).
- hid: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340).
- hv: do not reset hv_context.tsc_page on crash (fate#320485, bnc#1007729).
- hv: export current Hyper-V clocksource (bsc#1031206).
- hv_utils: implement Hyper-V PTP source (bsc#1031206).
- i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913).
- i2c: designware-baytrail: Call pmic_bus_access_notifier_chain (bsc#1011913).
- i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913).
- i2c: designware-baytrail: Only check iosf_mbi_available() for shared hosts (bsc#1011913).
- i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913).
- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).
- i2c: designware: Implement support for SMBus block read and write (bsc#1019351).
- i2c-designware: increase timeout (bsc#1011913).
- i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913).
- i2c: designware: Rename accessor_flags to flags (bsc#1011913).
- i2c: xgene: Fix missing code of DTB support (bsc#1019351).
- i40e: Be much more verbose about what we can and cannot offload (bsc#985561).
- ib/addr: Fix setting source address in addr6_resolve() (bsc#1044082).
- ib/core: Fix kernel crash during fail to initialize device (bsc#1022595 FATE#322350).
- ib/core: For multicast functions, verify that LIDs are multicast LIDs (bsc#1022595 FATE#322350).
- ib/core: If the MGID/MLID pair is not on the list return an error (bsc#1022595 FATE#322350).
- ib/ipoib: Fix deadlock between ipoib_stop and mcast join flow (bsc#1022595 FATE#322350).
- ib/mlx5: Assign DSCP for R-RoCE QPs Address Path (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Check supported flow table size (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Enlarge autogroup flow table (bsc#966170 bsc#966172 bsc#966191).
- ib/mlx5: Fix kernel to user leak prevention logic (bsc#966170 bsc#966172 bsc#966191).
- ibmveth: calculate gso_segs for large packets (bsc#1019148).
- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).
- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).
- ibmveth: set correct gso_size and gso_type (bsc#1019148).
- ibmvnic: Activate disabled RX buffer pools on reset (bsc#1044767).
- ibmvnic: Add set_link_state routine for setting adapter link state (fate#322021, bsc#1031512).
- ibmvnic: Allocate number of rx/tx buffers agreed on by firmware (fate#322021, bsc#1031512).
- ibmvnic: Allocate zero-filled memory for sub crqs (fate#322021, bsc#1031512).
- ibmvnic: Call napi_disable instead of napi_enable in failure path (fate#322021, bsc#1031512).
- ibmvnic: Check adapter state during ibmvnic_poll (fate#322021, bsc#1040855).
- ibmvnic: Check for driver reset first in ibmvnic_xmit (fate#322021, bsc#1038297).
- ibmvnic: Cleanup failure path in ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Clean up tx pools when closing (fate#322021, bsc#1038297).
- ibmvnic: Client-initiated failover (bsc#1043990).
- ibmvnic: Continue skb processing after skb completion error (fate#322021, bsc#1038297).
- ibmvnic: Correct crq and resource releasing (fate#322021, bsc#1031512).
- ibmvnic: Correct ibmvnic handling of device open/close (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the bounce buffer (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the rx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init and release routines for the tx pool (fate#322021, bsc#1031512).
- ibmvnic: Create init/release routines for stats token (fate#322021, bsc#1031512).
- ibmvnic: Deactivate RX pool buffer replenishment on H_CLOSED (fate#322021, bsc#1040855).
- ibmvnic: Delete napi's when releasing driver resources (fate#322021, bsc#1038297).
- ibmvnic: Disable irq prior to close (fate#322021, bsc#1031512).
- ibmvnic: Do not disable IRQ after scheduling tasklet (fate#322021, bsc#1031512).
- ibmvnic: driver initialization for kdump/kexec (bsc#1044772).
- ibmvnic: Ensure that TX queues are disabled in __ibmvnic_close (bsc#1044767).
- ibmvnic: Exit polling routine correctly during adapter reset (bsc#1044767).
- ibmvnic: Fix cleanup of SKB's on driver close (fate#322021, bsc#1040855).
- ibmvnic: Fix endian errors in error reporting output (fate#322021, bsc#1031512).
- ibmvnic: Fix endian error when requesting device capabilities (fate#322021, bsc#1031512).
- ibmvnic: Fix ibmvnic_change_mac_addr struct format (fate#322021, bsc#1031512).
- ibmvnic: Fix initial MTU settings (bsc#1031512).
- ibmvnic: fix missing unlock on error in __ibmvnic_reset() (fate#322021, bsc#1038297, Fixes: ed651a10875f).
- ibmvnic: Fix overflowing firmware/hardware TX queue (fate#322021, bsc#1031512).
- ibmvnic: Fixup atomic API usage (fate#322021, bsc#1031512).
- ibmvnic: Free skb's in cases of failure in transmit (fate#322021, bsc#1031512).
- ibmvnic: Free tx/rx scrq pointer array when releasing sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Halt TX and report carrier off on H_CLOSED return code (fate#322021, bsc#1040855).
- ibmvnic: Handle failover after failed init crq (fate#322021, bsc#1040855).
- ibmvnic: Handle processing of CRQ messages in a tasklet (fate#322021, bsc#1031512).
- ibmvnic: Initialize completion variables before starting work (fate#322021, bsc#1031512).
- ibmvnic: Insert header on VLAN tagged received frame (fate#322021, bsc#1031512).
- ibmvnic: Make CRQ interrupt tasklet wait for all capabilities crqs (fate#322021, bsc#1031512).
- ibmvnic: Merge the two release_sub_crq_queue routines (fate#322021, bsc#1031512).
- ibmvnic: Move ibmvnic adapter intialization to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of sub crqs to ibmvnic_init (fate#322021, bsc#1031512).
- ibmvnic: Move initialization of the stats token to ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login and queue negotiation into ibmvnic_open (fate#322021, bsc#1031512).
- ibmvnic: Move login to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Move queue restarting in ibmvnic_tx_complete (fate#322021, bsc#1038297).
- ibmvnic: Move resource initialization to its own routine (fate#322021, bsc#1038297).
- ibmvnic: Non-fatal error handling (fate#322021, bsc#1040855).
- ibmvnic: Only retrieve error info if present (fate#322021, bsc#1031512).
- ibmvnic: Record SKB RX queue during poll (fate#322021, bsc#1038297).
- ibmvnic: Remove debugfs support (fate#322021, bsc#1031512).
- ibmvnic: Remove inflight list (fate#322021, bsc#1031512).
- ibmvnic: Remove netdev notify for failover resets (bsc#1044120).
- ibmvnic: Remove unused bouce buffer (fate#322021, bsc#1031512).
- ibmvnic: Remove VNIC_CLOSING check from pending_scrq (bsc#1044767).
- ibmvnic: Replace is_closed with state field (fate#322021, bsc#1038297).
- ibmvnic: Report errors when failing to release sub-crqs (fate#322021, bsc#1031512).
- ibmvnic: Reset sub-crqs during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset the CRQ queue during driver reset (fate#322021, bsc#1040855).
- ibmvnic: Reset tx/rx pools on driver reset (fate#322021, bsc#1040855).
- ibmvnic: Return failure on attempted mtu change (bsc#1043236).
- ibmvnic: Sanitize entire SCRQ buffer on reset (bsc#1044767).
- ibmvnic: Send gratuitous arp on reset (fate#322021, bsc#1040855).
- ibmvnic: Set real number of rx queues (fate#322021, bsc#1031512).
- ibmvnic: Split initialization of scrqs to its own routine (fate#322021, bsc#1031512).
- ibmvnic: Track state of adapter napis (fate#322021, bsc#1040855).
- ibmvnic: Unmap longer term buffer before free (fate#322021, bsc#1031512).
- ibmvnic: Updated reset handling (fate#322021, bsc#1038297).
- ibmvnic: Update main crq initialization and release (fate#322021, bsc#1031512).
- ibmvnic: Use common counter for capabilities checks (fate#322021, bsc#1031512).
- ibmvnic: use max_mtu instead of req_mtu for MTU range check (bsc#1031512).
- ibmvnic: Validate napi exist before disabling them (fate#322021, bsc#1031512).
- ibmvnic: Wait for any pending scrqs entries at driver close (fate#322021, bsc#1038297).
- ibmvnic: Whitespace correction in release_rx_pools (fate#322021, bsc#1038297).
- iio: hid-sensor: Store restore poll and hysteresis on S3 (bsc#1031717).
- infiniband: avoid dereferencing uninitialized dst on error path (git-fixes).
- iommu/arm-smmu: Disable stalling faults for all endpoints (bsc#1038843).
- iommu/dma: Respect IOMMU aperture when allocating (bsc#1038842).
- iommu/exynos: Block SYSMMU while invalidating FLPD cache (bsc#1038848).
- iommu: Handle default domain attach failure (bsc#1038846).
- iommu/vt-d: Do not over-free page table directories (bsc#1038847).
- iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208).
- ipv4, ipv6: ensure raw socket message is big enough to hold an IP header (4.4.68 stable queue).
- ipv6: Do not use ufo handling on later transformed packets (bsc#1042286).
- ipv6: fix endianness error in icmpv6_err (bsc#1042286).
- ipv6: initialize route null entry in addrconf_init() (4.4.68 stable queue).
- ipv6: release dst on error in ip6_dst_lookup_tail (git-fixes).
- ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf (4.4.68 stable queue).
- isa: Call isa_bus_init before dependent ISA bus drivers register (bsc#1031717).
- iscsi-target: Return error if unable to add network portal (bsc#1032803).
- iw_cxgb4: Guard against null cm_id in dump_ep/qp (bsc#1026570).
- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).
- jump label: fix passing kbuild_cflags when checking for asm goto support (git-fixes).
- kabi: Hide new include in arch/powerpc/kernel/process.c (fate#322421).
- kABI: move and hide new cxgbi device owner field (bsc#1018885).
- kABI: protect cgroup include in kernel/kthread (kabi).
- kABI: protect struct fib_info (kabi).
- kABI: protect struct iscsi_conn (kabi).
- kABI: protect struct mnt_namespace (kabi).
- kABI: protect struct musb_platform_ops (kabi).
- kABI: protect struct pglist_data (kabi).
- kABI: protect struct se_node_acl (kabi).
- kABI: protect struct snd_fw_async_midi_port (kabi).
- kABI: protect struct tcp_fastopen_cookie (kabi).
- kABI: protect struct user_fpsimd_state (kabi).
- kABI: protect struct wake_irq (kabi).
- kABI: protect struct xhci_hcd (kabi).
- kABI: protect struct xlog (bsc#1043598).
- kABI: restore can_rx_register parameters (kabi).
- kABI: restore ttm_ref_object_add parameters (kabi).
- kABI workaround 4.4.65 adding #include <linux/mount.h> to kernel/sysctl.c
- kabi workaround for net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)
- kernel: Fix invalid domain response handling (bnc#1009718, LTC#149851).
- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).
- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).
- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).
- kgr/module: make a taint flag module-specific (fate#313296).
- kgr: remove all arch-specific kgraft header files (fate#313296).
- kprobes/x86: Fix kernel panic when certain exception-handling addresses are probed (4.4.68 stable queue).
- kvm: better MWAIT emulation for guests (bsc#1031142).
- kvm: nVMX: do not leak PML full vmexit to L1 (4.4.68 stable queue).
- kvm: nVMX: initialize PML fields in vmcs02 (4.4.68 stable queue).
- kvm: svm: add support for RDTSCP (bsc#1033117).
- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).
- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).
- l2tp: fix race in l2tp_recv_common() (bsc#1042286).
- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).
- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).
- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).
- l2tp: lock socket before checking flags in connect() (bsc#1028415).
- leds: ktd2692: avoid harmless maybe-uninitialized warning (4.4.68 stable queue).
- libata-scsi: Fixup ata_gen_passthru_sense() (bsc#1040125).
- libceph: NULL deref on crush_decode() error path (bsc#1044015).
- libcxgb: add library module for Chelsio drivers (bsc#1021424).
- lib/mpi: mpi_read_raw_data(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_data(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): do not include leading zero SGEs in nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes (bsc#1003581).
- lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices (bsc#1003581).
- libnvdimm, pfn: fix align attribute (bsc#1023175).
- libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717).
- libnvdimm, pfn: fix 'npfns' vs section alignment (bsc#1040125).
- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).
- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).
- locking/ww_mutex: Fix compilation of __WW_MUTEX_INITIALIZER (bsc#1031717).
- lpfc: remove incorrect lockdep assertion (bsc#1040125).
- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).
- md: allow creation of mdNNN arrays via md_mod/parameters/new_array (bsc#1032339).
- md.c:didn't unlock the mddev before return EINVAL in array_size_store (bsc#1038143).
- md-cluster: convert the completion to wait queue (fate#316335).
- md-cluster: fix potential lock issue in add_new_disk (bsc#1041087).
- md-cluster: protect md_find_rdev_nr_rcu with rcu lock (fate#316335).
- md: ensure md devices are freed before module is unloaded (bsc#1022304).
- md: fix refcount problem on mddev when stopping array (bsc#1022304).
- md: handle read-only member devices better (bsc#1033281).
- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).
- md: MD_CLOSING needs to be cleared after called md_set_readonly or do_md_stop (bsc#1038142).
- md/raid1: add rcu protection to rdev in fix_read_error (References: bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: avoid reusing a resync bio after error handling (Fate#311379).
- md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783).
- md/raid1: Refactor raid1_make_request (bsc#998106,bsc#1020048,bsc#982783).
- md: support disabling of create-on-open semantics (bsc#1032339).
- media: am437x-vpfe: fix an uninitialized variable bug (bsc#1031717).
- media: b2c2: use IS_REACHABLE() instead of open-coding it (bsc#1031717).
- media: c8sectpfe: Rework firmware loading mechanism (bsc#1031717).
- media: cx231xx-audio: fix NULL-deref at probe (bsc#1031717).
- media: cx231xx-cards: fix NULL-deref at probe (bsc#1031717).
- media: cx23885: uninitialized variable in cx23885_av_work_handler() (bsc#1031717).
- media: DaVinci-VPBE: Check return value of a setup_if_config() call in vpbe_set_output() (bsc#1031717).
- media: DaVinci-VPFE-Capture: fix error handling (bsc#1031717).
- media: dib0700: fix NULL-deref at probe (bsc#1031717).
- media: dvb-usb: avoid link error with dib3000m{b,c| (bsc#1031717).
- media: exynos4-is: fix a format string bug (bsc#1031717).
- media: gspca: konica: add missing endpoint sanity check (bsc#1031717).
- media: lirc_imon: do not leave imon_probe() with mutex held (bsc#1031717).
- media: pvrusb2: reduce stack usage pvr2_eeprom_analyze() (bsc#1031717).
- media: rc: allow rc modules to be loaded if rc-main is not a module (bsc#1031717).
- media: s5p-mfc: Fix unbalanced call to clock management (bsc#1031717).
- media: sh-vou: clarify videobuf2 dependency (bsc#1031717).
- media: staging: media: davinci_vpfe: unlock on error in vpfe_reqbufs() (bsc#1031717).
- media: usbvision: fix NULL-deref at probe (bsc#1031717).
- media: uvcvideo: Fix empty packet statistic (bsc#1031717).
- media: uvcvideo: uvc_scan_fallback() for webcams with broken chain (bsc#1021474).
- media: vb2: Fix an off by one error in 'vb2_plane_vaddr' (bsc#1043231).
- mem-hotplug: fix node spanned pages when we have a movable node (bnc#1034671).
- mips: R2-on-R6 MULTU/MADDU/MSUBU emulation bugfix (4.4.68 stable queue).
- mlx4: Fix memory leak after mlx4_en_update_priv() (bsc#966170 bsc#966172 bsc#966191).
- mmc: debugfs: correct wrong voltage value (bsc#1031717).
- mmc: Downgrade error level (bsc#1042536).
- mm,compaction: serialize waitqueue_active() checks (bsc#971975).
- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for sdhci-arasan4.9a (bsc#1019351).
- mmc: sdhci-pxav3: fix higher speed mode capabilities (bsc#1031717).
- mmc: sdhci: restore behavior when setting VDD via external regulator (bsc#1031717).
- mm: fix <linux/pagemap.h> stray kernel-doc notation (bnc#971975 VM -- git fixes).
- mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195).
- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).
- mm/hugetlb: check for reserved hugepages during memory offline (bnc#971975 VM -- git fixes).
- mm/hugetlb: fix incorrect hugepages count during mem hotplug (bnc#971975 VM -- git fixes).
- mm/memblock.c: fix memblock_next_valid_pfn() (bnc#1031200).
- mm, memcg: do not retry precharge charges (bnc#1022559).
- mm, page_alloc: fix check for NULL preferred_zone (bnc#971975 VM performance -- page allocator).
- mm, page_alloc: fix fast-path race with cpuset update or removal (bnc#971975 VM performance -- page allocator).
- mm, page_alloc: fix premature OOM when racing with cpuset mems update (bnc#971975 VM performance -- page allocator).
- mm, page_alloc: keep pcp count and list contents in sync if struct page is corrupted (bnc#971975 VM performance -- page allocator).
- mm, page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM performance -- page allocator).
- mm/page_alloc: Remove useless parameter of __free_pages_boot_core (bnc#1027195).
- mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200).
- module: fix memory leak on early load_module() failures (bsc#1043014).
- module: move add_taint_module() to a header file (fate#313296).
- mountproto.patch: Add commit id
- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).
- mwifiex: Avoid skipping WEP key deletion for AP (4.4.68 stable queue).
- mwifiex: debugfs: Fix (sometimes) off-by-1 SSID print (4.4.68 stable queue).
- mwifiex: fix IBSS data path issue (bsc#1018813).
- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).
- mwifiex: pcie: fix cmd_buf use-after-free in remove/reset (bsc#1031717).
- mwifiex: Removed unused 'pkt_type' variable (bsc#1031717).
- mwifiex: remove redundant dma padding in AMSDU (4.4.68 stable queue).
- mwifiex: Remove unused 'bcd_usb' variable (bsc#1031717).
- mwifiex: Remove unused 'chan_num' variable (bsc#1031717).
- mwifiex: Remove unused 'pm_flag' variable (bsc#1031717).
- mwifiex: Remove unused 'sta_ptr' variable (bsc#1031717).
- net/af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945, LTC#150566).
- net: bridge: start hello timer only if device is up (bnc#1012382).
- net/ena: change condition for host attribute configuration (bsc#1026509).
- net/ena: change driver's default timeouts (bsc#1026509).
- net: ena: change the return type of ena_set_push_mode() to be void (bsc#1026509).
- net: ena: Fix error return code in ena_device_init() (bsc#1026509).
- net/ena: fix ethtool RSS flow configuration (bsc#1026509).
- net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509).
- net/ena: fix potential access to freed memory during device reset (bsc#1026509).
- net/ena: fix queues number calculation (bsc#1026509).
- net/ena: fix RSS default hash configuration (bsc#1026509).
- net/ena: reduce the severity of ena printouts (bsc#1026509).
- net/ena: refactor ena_get_stats64 to be atomic context safe (bsc#1026509).
- net/ena: remove ntuple filter support from device feature list (bsc#1026509).
- net: ena: remove superfluous check in ena_remove() (bsc#1026509).
- net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509).
- net/ena: update driver version to 1.1.2 (bsc#1026509).
- net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).
- net: ena: use setup_timer() and mod_timer() (bsc#1026509).
- net: ethernet: apm: xgene: use phydev from struct net_device (bsc#1019351).
- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634).
- netfilter: allow logging from non-init namespaces (bsc#970083).
- netfilter: nf_conntrack_sip: extend request line validation (bsc#1042286).
- netfilter: nf_ct_expect: remove the redundant slash when policy name is empty (bsc#1042286).
- netfilter: nf_dup_ipv6: set again FLOWI_FLAG_KNOWN_NH at flowi6_flags (bsc#1042286).
- netfilter: nf_nat_snmp: Fix panic when snmp_trap_helper fails to register (bsc#1042286).
- netfilter: nfnetlink_queue: reject verdict request from different portid (bsc#1042286).
- netfilter: restart search if moved to other chain (bsc#1042286).
- netfilter: use fwmark_reflect in nf_send_reset (bsc#1042286).
- net: fix compile error in skb_orphan_partial() (bnc#1012382).
- net: ibmvnic: Remove unused net_stats member from struct ibmvnic_adapter (fate#322021, bsc#1031512).
- net: icmp_route_lookup should use rt dev to determine L3 domain (bsc#1042286).
- net: implement netif_cond_dbg macro (bsc#1019168).
- net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).
- net: ipv6: set route type for anycast routes (bsc#1042286).
- net: l3mdev: Add master device lookup by index (bsc#1042286).
- net: make netdev_for_each_lower_dev safe for device removal (bsc#1042286).
- net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017).
- net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).
- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017).
- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017).
- net/mlx4_en: Fix bad WQE issue (bsc#1028017).
- net/mlx5: Do not unlock fte while still using it (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5e: Modify TIRs hash only when it's needed (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Fix create autogroup prev initializer (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Prevent setting multicast macs for VFs (bsc#966170 bsc#966172 bsc#966191).
- net/mlx5: Release FTE lock in error flow (bsc#966170 bsc#966172 bsc#966191).
- net: remove useless memset's in drivers get_stats64 (bsc#1019351).
- net: vrf: Create FIB tables on link create (bsc#1042286).
- net: vrf: Fix crash when IPv6 is disabled at boot time (bsc#1042286).
- net: vrf: Fix dev refcnt leak due to IPv6 prefix route (bsc#1042286).
- net: vrf: Fix dst reference counting (bsc#1042286).
- net: vrf: protect changes to private data with rcu (bsc#1042286).
- net: vrf: Switch dst dev to loopback on device delete (bsc#1042286).
- netvsc: add rcu_read locking to netvsc callback (fate#320485).
- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bsc#966339 FATE#320150).
- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).
- net: xgene: fix backward compatibility fix (bsc#1019351).
- net/xgene: fix error handling during reset (bsc#1019351).
- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).
- nfit: fail DSMs that return non-zero status by default (bsc#1023175).
- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).
- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).
- nfs: do not try to cross a mountpount when there isn't one there (bsc#1028041).
- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (git-fixes).
- nfs: Fix 'Do not increment lock sequence ID after NFS4ERR_MOVED' (git-fixes).
- nfs: Fix inode corruption in nfs_prime_dcache() (git-fixes).
- nfs: Fix missing pg_cleanup after nfs_pageio_cond_complete() (git-fixes).
- nfs: Fix NFS4 nfs4_do_reclaim() might_sleep()/scheduling while atomic splats. Bug exists in all RT trees >= v3.16, was spotted/fixed in v4.8-rt, but with no stable-rt backport. Pick it up.
- nfs: flush out dirty data on file fput() (bsc#1021762).
- nfs: Use GFP_NOIO for two allocations in writeback (git-fixes).
- nfsv4.1: Fix Oopsable condition in server callback races (git-fixes).
- nfsv4: fix a reference leak caused WARNING messages (git-fixes).
- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).
- nsfs: mark dentry with DCACHE_RCUACCESS (bsc#1012829).
- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).
- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).
- nvme: Delete created IO queues on reset (bsc#1031717).
- nvme: Do not suspend admin queue that wasn't created (bsc#1026505).
- nvme: submit nvme_admin_activate_fw to admin queue (bsc#1044532).
- nvme: Suspend all queues before deletion (bsc#1026505).
- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (bsc#1004003).
- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (bsc#1004003).
- overlayfs: compat, fix incorrect dentry use in ovl_rename2 (bsc#1032400).
- overlayfs: compat, use correct dentry to detect compat mode in ovl_compat_is_whiteout (bsc#1032400).
- pci: Add devm_request_pci_bus_resources() (bsc#1019351).
- pci/AER: include header file (bsc#964944,FATE#319965).
- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).
- pci: hv: Fix wslot_to_devfn() to fix warnings on device removal (fate#320485, bug#1028217).
- pci: hv: Use device serial number as PCI domain (fate#320485, bug#1028217).
- pci: pciehp: Prioritize data-link event over presence detect (bsc#1031040,bsc#1037483).
- pci: Reverse standard ACS vs device-specific ACS enabling (bsc#1030057).
- pci: Work around Intel Sunrise Point PCH incorrect ACS capability (bsc#1030057).
- pci: xgene: Add local struct device pointers (bsc#1019351).
- pci: xgene: Add register accessors (bsc#1019351).
- pci: xgene: Free bridge resource list on failure (bsc#1019351).
- pci: xgene: Make explicitly non-modular (bsc#1019351).
- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).
- pci: xgene: Remove unused platform data (bsc#1019351).
- pci: xgene: Request host bridge window resources (bsc#1019351).
- percpu: remove unused chunk_alloc parameter from pcpu_get_pages() (bnc#971975 VM -- git fixes).
- perf/x86/intel/rapl: Make Knights Landings support functional (bsc#1042517).
- perf/x86/intel/uncore: Remove SBOX support for Broadwell server (bsc#1035887).
- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).
- phy: qcom-usb-hs: Add depends on EXTCON (4.4.68 stable queue).
- phy: xgene: rename 'enum phy_mode' to 'enum xgene_phy_mode' (bsc#1019351).
- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes (bnc#1012985).
- ping: implement proper locking (bsc#1031003).
- pkcs#7: fix missing break on OID_sha224 case (bsc#1031717).
- platform/x86: fujitsu-laptop: use brightness_set_blocking for LED-setting callbacks (bsc#1031717).
- pm / QoS: Fix memory leak on resume_latency.notifiers (bsc#1043231).
- pm / wakeirq: Enable dedicated wakeirq for suspend (bsc#1031717).
- pm / wakeirq: Fix spurious wake-up events for dedicated wakeirqs (bsc#1031717).
- pm / wakeirq: report a wakeup_event on dedicated wekup irq (bsc#1031717).
- power: bq27xxx: fix register numbers of bq27500 (bsc#1031717).
- powerpc/64: Fix flush_(d|i)cache_range() called from modules (bnc#863764 fate#315275, LTC#103998).
- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).
- powerpc: Create a helper for getting the kernel toc value (FATE#322421).
- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).
- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).
- powerpc/fadump: Update fadump documentation (bsc#1032141).
- powerpc/ftrace: Add Kconfig & Make glue for mprofile-kernel (FATE#322421).
- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).
- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).
- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).
- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).
- powerpc/livepatch: Add livepatch header (FATE#322421).
- powerpc/livepatch: Add live patching support on ppc64le (FATE#322421).
- powerpc/livepatch: Add livepatch stack to struct thread_info (FATE#322421).
- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).
- powerpc/module: Mark module stubs with a magic value (FATE#322421).
- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).
- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).
- powerpc/powernv: Fix opal_exit tracepoint opcode (4.4.68 stable queue).
- power: reset: xgene-reboot: Unmap region obtained by of_iomap (bsc#1019351).
- power: supply: bq24190_charger: Call power_supply_changed() for relevant component (4.4.68 stable queue).
- power: supply: bq24190_charger: Call set_mode_host() on pm_resume() (4.4.68 stable queue).
- power: supply: bq24190_charger: Do not read fault register outside irq_handle_thread() (4.4.68 stable queue).
- power: supply: bq24190_charger: Fix irq trigger to IRQF_TRIGGER_FALLING (4.4.68 stable queue).
- power: supply: bq24190_charger: Handle fault before status on interrupt (4.4.68 stable queue).
- power: supply: bq24190_charger: Install irq_handler_thread() at end of probe() (4.4.68 stable queue).
- printk: Switch to the sync mode when an emergency message is printed (bsc#1034995).
- qeth: check not more than 16 SBALEs on the completion queue (bnc#1009718, LTC#148203).
- quota: fill in Q_XGETQSTAT inode information for inactive quotas (bsc#1042356).
- radix-tree: fix radix_tree_iter_retry() for tagged iterators (bsc#1012829).
- raid1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783).
- raid1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783).
- raid1: ignore discard error (bsc#1017164).
- ravb: Fix use-after-free on `ifconfig eth0 down` (git-fixes).
- rdma/iw_cxgb4: Add missing error codes for act open cmd (bsc#1026570).
- rdma/iw_cxgb4: Low resource fixes for Completion queue (bsc#1026570).
- rdma/iw_cxgb4: only read markers_enabled mod param once (bsc#1026570).
- Refresh patches.suse/blk-timeout-no-round. Refresh patches.drivers/0041-block-add-ability-to-flag-write-back-caching-on-a-device.patch Do not collide with QUEUE_FLAG_WC from upstream (bsc#1022547)
- regulator: isl9305: fix array size (bsc#1031717).
- reiserfs: fix race in prealloc discard (bsc#987576).
- Revert 'acpi, nfit, libnvdimm: fix interleave set cookie calculation (64-bit comparison)' (kabi).
- Revert 'btrfs: qgroup: Move half of the qgroup accounting time out of' (bsc#1017461 bsc#1033885).
- Revert 'btrfs: qgroup: Move half of the qgroup accounting time out of' This reverts commit f69c1d0f6254c73529a48fd2f87815d047ad7288.
- Revert 'give up on gcc ilog2() constant optimizations' (kabi).
- Revert 'KVM: nested VMX: disable perf cpuid reporting' (4.4.68 stable queue).
- Revert 'l2tp: take reference on sessions being dumped' (kabi).
- Revert 'mac80211: pass block ack session timeout to to driver' (kabi).
- Revert 'mac80211: RX BA support for sta max_rx_aggregation_subframes' (kabi).
- Revert 'net: introduce device min_header_len' (kabi).
- Revert 'net/mlx4_en: Avoid unregister_netdev at shutdown flow' (bsc#1028017).
- Revert 'nfit, libnvdimm: fix interleave set cookie calculation' (kabi).
- Revert 'RDMA/core: Fix incorrect structure packing for booleans' (kabi).
- Revert 'target: Fix NULL dereference during LUN lookup + active I/O shutdown' (kabi).
- Revert 'wlcore: Add RX_BA_WIN_SIZE_CHANGE_EVENT event' (kabi).
- rpm/kernel-binary.spec.in: Fix installation of /etc/uefi/certs (bsc#1019594)
- rpm/kernel-binary.spec: remove superfluous flags This should make build logs more readable and people adding more flags should have easier time finding a place to add them in the spec file.
- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)
- rpm/SLES-UEFI-SIGN-Certificate-2048.crt: Update the certificate (bsc#1035922)
- rtc: cmos: avoid unused function warning (bsc#1022429).
- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).
- rtc: cmos: Do not enable interrupts in the middle of the interrupt handler (bsc#1022429).
- rtc: cmos: Restore alarm after resume (bsc#1022429).
- rtlwifi: rtl_usb: Fix missing entry in USB driver's private data (bsc#1026462).
- rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string (4.4.68 stable queue).
- rtnl: reset calcit fptr in rtnl_unregister() (bsc#1042286).
- s390/cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).
- s390/dasd: check if query host access feature is supported (bsc#1037871).
- s390/kmsg: add missing kmsg descriptions (bnc#1025683, LTC#151573).
- s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683, LTC#152318).
- s390/sysinfo: show partition extended name and UUID if available (bnc#1009718, LTC#150160).
- s390/time: LPAR offset handling (bnc#1009718, LTC#146920).
- s390/time: move PTFF definitions (bnc#1009718, LTC#146920).
- sbp-target: Fix second argument of percpu_ida_alloc() (bsc#1032803).
- sched: Allow hotplug notifiers to be setup early (bnc#1022476).
- sched/core: Fix incorrect utilization accounting when switching to fair class (bnc#1022476).
- sched/core: Fix set_user_nice() (bnc#1022476).
- sched/core, x86/topology: Fix NUMA in package topology bug (bnc#1022476).
- sched/cputime: Add steal time support to full dynticks CPU time accounting (bnc#1022476).
- sched/cputime: Fix prev steal time accouting during CPU hotplug (bnc#1022476).
- sched/deadline: Always calculate end of period on sched_yield() (bnc#1022476).
- sched/deadline: Fix a bug in dl_overflow() (bnc#1022476).
- sched/deadline: Fix lock pinning warning during CPU hotplug (bnc#1022476).
- sched/deadline: Fix wrap-around in DL heap (bnc#1022476).
- sched/fair: Avoid using decay_load_missed() with a negative value (bnc#1022476).
- sched/fair: Fix fixed point arithmetic width for shares and effective load (bnc#1022476).
- sched/fair: Fix load_above_capacity fixed point arithmetic width (bnc#1022476).
- sched/fair: Fix min_vruntime tracking (bnc#1022476).
- sched/fair: Fix the wrong throttled clock time for cfs_rq_clock_task() (bnc#1022476).
- sched/fair: Improve PELT stuff some more (bnc#1022476).
- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).
- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).
- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).
- sched/rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).
- sched/rt, sched/dl: Do not push if task's scheduling class was changed (bnc#1022476).
- scsi: be2iscsi: Add FUNCTION_RESET during driver unload (bsc#1038458).
- scsi: be2iscsi: Add IOCTL to check UER supported (bsc#1038458).
- scsi: be2iscsi: Add TPE recovery feature (bsc#1038458).
- scsi: be2iscsi: Add V1 of EPFW cleanup IOCTL (bsc#1038458).
- scsi: be2iscsi: allocate enough memory in beiscsi_boot_get_sinfo() (bsc#1038458).
- scsi: be2iscsi: Check all zeroes IP before issuing IOCTL (bsc#1038458).
- scsi: be2iscsi: Fail the sessions immediately after TPE (bsc#1038458).
- scsi: be2iscsi: Fix async PDU handling path (bsc#1038458).
- scsi: be2iscsi: Fix bad WRB index error (bsc#1038458).
- scsi: be2iscsi: Fix checks for HBA in error state (bsc#1038458).
- scsi: be2iscsi: Fix gateway APIs to support IPv4 & IPv6 (bsc#1038458).
- scsi: be2iscsi: Fix POST check and reset sequence (bsc#1038458).
- scsi: be2iscsi: Fix queue and connection parameters (bsc#1038458).
- scsi: be2iscsi: Fix release of DHCP IP in static mode (bsc#1038458).
- scsi: be2iscsi: Fix to add timer for UE detection (bsc#1038458).
- scsi: be2iscsi: Fix to make boot discovery non-blocking (bsc#1038458).
- scsi: be2iscsi: Fix to use correct configuration values (bsc#1038458).
- scsi: be2iscsi: Handle only NET_PARAM in iface_get_param (bsc#1038458).
- scsi: be2iscsi: Move functions to right files (bsc#1038458).
- scsi: be2iscsi: Move VLAN code to common iface_set_param (bsc#1038458).
- scsi: be2iscsi: Reduce driver load/unload time (bsc#1038458).
- scsi: be2iscsi: Remove alloc_mcc_tag & beiscsi_pci_soft_reset (bsc#1038458).
- scsi: be2iscsi: Remove isr_lock and dead code (bsc#1038458).
- scsi: be2iscsi: Rename iface get/set/create/destroy APIs (bsc#1038458).
- scsi: be2iscsi: Replace _bh version for mcc_lock spinlock (bsc#1038458).
- scsi: be2iscsi: Set and return right iface v4/v6 states (bsc#1038458).
- scsi: be2iscsi: Update copyright information (bsc#1038458).
- scsi: be2iscsi: Update iface handle before any set param (bsc#1038458).
- scsi: be2iscsi: Update the driver version (bsc#1038458).
- scsi: cxgb4i: libcxgbi: add missing module_put() (bsc#1018885).
- scsi: cxgb4i: libcxgbi: cxgb4: add T6 iSCSI completion feature (bsc#1021424).
- scsi: cxlflash: Remove the device cleanly in the system shutdown path (bsc#1028310, fate#321597, bsc#1034762). cherry-pick from SP3
- scsi_dh_alua: do not call BUG_ON when updating port group (bsc#1028340).
- scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910).
- scsi_dh_alua: Do not retry for unmapped device (bsc#1012910).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#1027054).
- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).
- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).
- scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION (bsc#1034419).
- scsi: ipr: Driver version 2.6.4 (bsc#1031555, fate#321595).
- scsi: ipr: Error path locking fixes (bsc#1031555, fate#321595).
- scsi: ipr: Fix abort path race condition (bsc#1031555, fate#321595).
- scsi: ipr: Fix missed EH wakeup (bsc#1031555, fate#321595).
- scsi: ipr: Fix SATA EH hang (bsc#1031555, fate#321595).
- scsi: ipr: Remove redundant initialization (bsc#1031555, fate#321595).
- scsi: mac_scsi: Fix MAC_SCSI=m option when SCSI=m (4.4.68 stable queue).
- scsi: scsi_dh_alua: Check scsi_device_get() return value (bsc#1040125).
- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (4.4.68 stable queue).
- scsi_transport_fc: do not call queue_work under lock (bsc#1013887).
- scsi_transport_fc: fixup race condition in fc_rport_final_delete() (bsc#1013887).
- scsi_transport_fc: return -EBUSY for deleted vport (bsc#1013887).
- sctp: check af before verify address in sctp_addr_id2transport (git-fixes).
- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).
- serial: 8250_omap: Fix probe and remove for PM runtime (4.4.68 stable queue).
- series.conf cosmetic adjustment (missing rt version placeholders)
- series.conf: remove silly comment
- ses: Fix SAS device detection in enclosure (bsc#1016403).
- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).
- sfc: refactor debug-or-warnings printks (bsc#1019168).
- softirq: Let ksoftirqd do its job (bsc#1019618).
- staging: emxx_udc: remove incorrect __init annotations (4.4.68 stable queue).
- staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data() (bsc#1031717).
- staging: wlan-ng: add missing byte order conversion (4.4.68 stable queue).
- sunrpc: Allow xprt->ops->timer method to sleep (git-fixes).
- sunrpc: ensure correct error is reported by xs_tcp_setup_socket() (git-fixes).
- sunrpc: fix UDP memory accounting (git-fixes).
- sunrpc: Silence WARN_ON when NFSv4.1 over RDMA is in use (git-fixes).
- supported.conf: added drivers/net/ethernet/chelsio/libcxgb/libcxgb
- supported.conf: Add tcp_westwood as supported module (fate#322432)
- supported.conf: Bugzilla and FATE references for dcdbas and dell_rbu
- sysfs: be careful of error returns from ops->show() (bsc#1028883).
- taint/module: Clean up global and module taint flags handling (fate#313296).
- target: add XCOPY target/segment desc sense codes (bsc#991273).
- target: bounds check XCOPY segment descriptor list (bsc#991273).
- target: bounds check XCOPY total descriptor list length (bsc#991273).
- target: check for XCOPY parameter truncation (bsc#991273).
- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).
- target: simplify XCOPY wwn->se_dev lookup helper (bsc#991273).
- target: support XCOPY requests without parameters (bsc#991273).
- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).
- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).
- tcp: account for ts offset only if tsecr not zero (bsc#1042286).
- tcp: do not inherit fastopen_req from parent (4.4.68 stable queue).
- tcp: do not underestimate skb->truesize in tcp_trim_head() (4.4.68 stable queue).
- tcp: fastopen: accept data/FIN present in SYNACK message (bsc#1042286).
- tcp: fastopen: avoid negative sk_forward_alloc (bsc#1042286).
- tcp: fastopen: call tcp_fin() if FIN present in SYNACK (bsc#1042286).
- tcp: fastopen: fix rcv_wup initialization for TFO server on SYN/data (bsc#1042286).
- tcp: fix wraparound issue in tcp_lp (4.4.68 stable queue).
- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).
- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).
- tpm: Downgrade error level (bsc#1042535).
- tpm: fix checks for policy digest existence in tpm2_seal_trusted() (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix RC value check in tpm2_seal_trusted (bsc#1034048, Pending fixes 2017-04-10).
- tpm: fix: set continueSession attribute for the unseal operation (bsc#1034048, Pending fixes 2017-04-10).
- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).
- udp: avoid ufo handling on IP payload compression packets (bsc#1042286).
- udplite: call proper backlog handlers (bsc#1042286).
- Update mainline reference in patches.drivers/drm-ast-Fix-memleaks-in-error-path-in-ast_fb_create.patch See (bsc#1028158) for the context in which this was discovered upstream.
- Update metadata for serial fixes (bsc#1013001)
- Update patches.fixes/xen-silence-efi-error-messge.patch (bnc#1039900).
- Update patches.kernel.org/patch-4.4.47-48 (bnc#1012382 bnc#1022181). Add a bnc reference.
- usb: chipidea: Handle extcon events properly (4.4.68 stable queue).
- usb: chipidea: Only read/write OTGSC from one place (4.4.68 stable queue).
- usb: host: ehci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: host: ohci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).
- usb: musb: ux500: Fix NULL pointer dereference at system PM (bsc#1038033).
- usb: serial: ark3116: fix open error handling (bnc#1038043).
- usb: serial: ch341: add register and USB request definitions (bnc#1038043).
- usb: serial: ch341: add support for parity, frame length, stop bits (bnc#1038043).
- usb: serial: ch341: fix baud rate and line-control handling (bnc#1038043).
- usb: serial: ch341: fix line settings after reset-resume (bnc#1038043).
- usb: serial: ch341: fix modem-status handling (bnc#1038043).
- usb: serial: ch341: reinitialize chip on reconfiguration (bnc#1038043).
- usb: serial: digi_acceleport: fix incomplete rx sanity check (4.4.68 stable queue).
- usb: serial: fix compare_const_fl.cocci warnings (bnc#1038043).
- usb: serial: ftdi_sio: fix latency-timer error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix descriptor error handling (4.4.68 stable queue).
- usb: serial: io_edgeport: fix epic-descriptor handling (bnc#1038043).
- usb: serial: keyspan_pda: fix receive sanity checks (4.4.68 stable queue).
- usb: serial: mct_u232: fix modem-status error handling (4.4.68 stable queue).
- usb: serial: quatech2: fix control-message error handling (bnc#1038043).
- usb: serial: sierra: fix bogus alternate-setting assumption (bnc#1038043).
- usb: serial: ssu100: fix control-message error handling (bnc#1038043).
- usb: serial: ti_usb_3410_5052: fix control-message error handling (4.4.68 stable queue).
- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available.
- Use up spare in struct module for livepatch (FATE#322421).
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- vrf: remove slave queue and private slave struct (bsc#1042286).
- vsock: Detach QP check should filter out non matching QPs (bsc#1036752).
- x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).
- x86/CPU/AMD: Fix Zen SMT topology (bsc#1027512).
- x86/ioapic: Change prototype of acpi_ioapic_add() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix incorrect pointers in ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616).
- x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616).
- x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616).
- x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616).
- x86/ioapic: Restore IO-APIC irq_chip retrigger callback (4.4.68 stable queue).
- x86/ioapic: Simplify ioapic_setup_resources() (bsc#1027153, bsc#1027616).
- x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616).
- x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).
- x86/MCE: Dump MCE to dmesg if no consumers (bsc#1013994).
- x86/mce: Fix copy/paste error in exception table entries (fate#319858).
- x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405).
- x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405).
- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression >= 0 (4.4.68 stable queue).
- x86/PCI: Mark Broadwell-EP Home Agent 1 as having non-compliant BARs (bsc#9048891).
- x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).
- x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913).
- x86/platform/intel-mid: Correct MSI IRQ line for watchdog device (4.4.68 stable queue).
- x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220).
- x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).
- x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).
- x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).
- x86/platform/uv/BAU: Add generic function pointers (bsc#1035024).
- x86/platform/uv/BAU: Add payload descriptor qualifier (bsc#1035024).
- x86/platform/uv/BAU: Add status mmr location fields to bau_control (bsc#1035024).
- x86/platform/uv/BAU: Add UV4-specific functions (bsc#1035024).
- x86/platform/uv/BAU: Add uv_bau_version enumerated constants (bsc#1035024).
- x86/platform/uv/BAU: Add wait_completion to bau_operations (bsc#1035024).
- x86/platform/uv/BAU: Clean up and update printks (bsc#1035024).
- x86/platform/uv/BAU: Cleanup bau_operations declaration and instances (bsc#1035024).
- x86/platform/uv/BAU: Clean up pq_init() (bsc#1035024).
- x86/platform/uv/BAU: Clean up vertical alignment (bsc#1035024).
- x86/platform/uv/BAU: Convert uv_physnodeaddr() use to uv_gpa_to_offset() (bsc#1035024).
- x86/platform/uv/BAU: Disable software timeout on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Fix HUB errors by remove initial write to sw-ack register (bsc#1035024).
- x86/platform/uv/BAU: Fix payload queue setup on UV4 hardware (bsc#1035024).
- x86/platform/uv/BAU: Implement uv4_wait_completion with read_status (bsc#1035024).
- x86/platform/uv/BAU: Populate ->uvhub_version with UV4 version information (bsc#1035024).
- x86/platform/uv/BAU: Use generic function pointers (bsc#1035024).
- x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866).
- x86/platform/UV: Clean up the UV APIC code (bsc#1023866).
- x86/platform/UV: Ensure uv_system_init is called when necessary (bsc#1023866).
- x86/platform/UV: Fix 2 socket config problem (bsc#1023866).
- x86/platform/uv: Fix calculation of Global Physical Address (bsc#1031147).
- x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).
- x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source (bsc#1023866).
- x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866).
- x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027).
- xen: add sysfs node for guest type (bnc#1037840).
- xen: adjust early dom0 p2m handling to xen hypervisor behavior (bnc#1031470).
- xen-blkback: do not leak stack data via response ring (bsc#1042863 XSA-216).
- xen-blkfront: correct maximum segment accounting (bsc#1018263).
- xen-blkfront: do not call talk_to_blkback when already connected to blkback.
- xen/blkfront: Fix crash if backend does not follow the right states.
- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.
- xen/mce: do not issue error message for failed /dev/mcelog registration (bnc#1036638).
- xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).
- xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136)
- xfrm: Fix memory leak of aead algorithm name (bsc#1042286).
- xfrm: Only add l3mdev oif to dst lookups (bsc#1042286).
- xfs: add missing include dependencies to xfs_dir2.h (bsc#1042421).
- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).
- xfs: do not allow di_size with high bit set (bsc#1024234).
- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1041160).
- xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609).
- xfs: do not warn on buffers not being recovered due to LSN (bsc#1043598).
- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).
- xfs: fix broken multi-fsb buffer logging (bsc#1024081).
- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).
- xfs: fix eofblocks race with file extending async dio writes (bsc#1040929).
- xfs: Fix missed holes in SEEK_HOLE implementation (bsc#1041168).
- xfs: fix off-by-one on max nr_pages in xfs_find_get_desired_pgoff() (bsc#1041168).
- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).
- xfs: fix xfs_mode_to_ftype() prototype (bsc#1043598).
- xfs: in _attrlist_by_handle, copy the cursor back to userspace (bsc#1041242).
- xfs: log recovery tracepoints to track current lsn and buffer submission (bsc#1043598).
- xfs: Make __xfs_xattr_put_listen preperly report errors (bsc#1041242).
- xfs: only return -errno or success from attr ->put_listent (bsc#1041242).
- xfs: pass current lsn to log recovery buffer validation (bsc#1043598).
- xfs: refactor log record unpack and data processing (bsc#1043598).
- xfs: replace xfs_mode_to_ftype table with switch statement (bsc#1042421).
- xfs: rework log recovery to submit buffers on LSN boundaries (bsc#1043598).
- xfs: rework the inline directory verifiers (bsc#1042421).
- xfs: sanity check directory inode di_size (bsc#1042421).
- xfs: sanity check inode di_mode (bsc#1042421).
- xfs: Split default quota limits by quota type (bsc#1040941).
- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).
- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).
- xfs: update metadata LSN in buffers during log recovery (bsc#1043598).
- xfs: use ->b_state to fix buffer I/O accounting release race (bsc#1041160).
- xfs: verify inline directory data forks (bsc#1042421).
- xgene_enet: remove bogus forward declarations (bsc#1032673).
- zswap: do not param_set_charp while holding spinlock (VM Functionality, bsc#1042886).
- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)
- blacklist.conf: blacklist c34a69059d78 (bnc#1044880)
- btrfs: disable possible cause of premature ENOSPC (bsc#1040182)
- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).
- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).
- dm: remove dummy dm_table definition (bsc#1045307)
- Fix soft lockup in svc_rdma_send (bsc#1044854).
- fs/exec.c: account for argv/envp pointers (bnc#1039354, CVE-2017-1000365).
- hpsa: limit transfer length to 1MB (bsc#1025461).
- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).
- IB/ipoib: Fix memory leak in create child syscall (bsc#1022595 FATE#322350).
- ibmvnic: Correct return code checking for ibmvnic_init during probe (bsc#1045286).
- ibmvnic: Fix assignment of RX/TX IRQ's (bsc#1046589).
- ibmvnic: Fix error handling when registering long-term-mapped buffers (bsc#1045568).
- ibmvnic: Fix incorrectly defined ibmvnic_request_map_rsp structure (bsc#1045568).
- ibmvnic: Remove module author mailing address (bsc#1045467).
- ibmvnic: Return from ibmvnic_resume if not in VNIC_OPEN state (bsc#1045235).
- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).
- iwlwifi: 8000: fix MODULE_FIRMWARE input.
- iwlwifi: 9000: increase the number of queues.
- iwlwifi: add device ID for 8265.
- iwlwifi: add device IDs for the 8265 device.
- iwlwifi: add disable_11ac module param.
- iwlwifi: add new 3168 series devices support.
- iwlwifi: add new 8260 PCI IDs.
- iwlwifi: add new 8265.
- iwlwifi: add new 8265 series PCI ID.
- iwlwifi: Add new PCI IDs for 9260 and 5165 series.
- iwlwifi: Add PCI IDs for the new 3168 series.
- iwlwifi: Add PCI IDs for the new series 8165.
- iwlwifi: add support for 12K Receive Buffers.
- iwlwifi: add support for getting HW address from CSR.
- iwlwifi: avoid d0i3 commands when no/init ucode is loaded.
- iwlwifi: bail out in case of bad trans state.
- iwlwifi: block the queues when we send ADD_STA for uAPSD.
- iwlwifi: change the Intel Wireless email address.
- iwlwifi: check for valid ethernet address provided by OEM.
- iwlwifi: clean up transport debugfs handling.
- iwlwifi: clear ieee80211_tx_info->driver_data in the op_mode.
- iwlwifi: Document missing module options.
- iwlwifi: dump prph registers in a common place for all transports.
- iwlwifi: dvm: advertise NETIF_F_SG.
- iwlwifi: dvm: fix compare_const_fl.cocci warnings.
- iwlwifi: dvm: handle zero brightness for wifi LED.
- iwlwifi: dvm: remove a wrong dependency on m.
- iwlwifi: dvm: remove Kconfig default.
- iwlwifi: dvm: remove stray debug code.
- iwlwifi: export the _no_grab version of PRPH IO functions.
- iwlwifi: expose fw usniffer mode to more utilities.
- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000.
- iwlwifi: Fix firmware name maximum length definition.
- iwlwifi: fix name of ucode loaded for 8265 series.
- iwlwifi: fix printf specifier.
- iwlwifi: generalize d0i3_entry_timeout module parameter.
- iwlwifi: mvm: adapt the firmware assert log to new firmware.
- iwlwifi: mvm: add 9000-series RX API.
- iwlwifi: mvm: add 9000 series RX processing.
- iwlwifi: mvm: add a non-trigger window to fw dbg triggers.
- iwlwifi: mvm: add an option to start rs from HT/VHT rates.
- iwlwifi: mvm: Add a station in monitor mode.
- iwlwifi: mvm: add bt rrc and ttc to debugfs.
- iwlwifi: mvm: add bt settings to debugfs.
- iwlwifi: mvm: add ctdp operations to debugfs.
- iwlwifi: mvm: add CT-KILL notification.
- iwlwifi: mvm: add debug print if scan config is ignored.
- iwlwifi: mvm: add extended dwell time.
- iwlwifi: mvm: add new ADD_STA command version.
- iwlwifi: mvm: Add P2P client snoozing.
- iwlwifi: mvm: add registration to cooling device.
- iwlwifi: mvm: add registration to thermal zone.
- iwlwifi: mvm: add support for negative temperatures.
- iwlwifi: mvm: add tlv for multi queue rx support.
- iwlwifi: mvm: add trigger for firmware dump upon TDLS events.
- iwlwifi: mvm: add trigger for firmware dump upon TX response status.
- iwlwifi: mvm: advertise NETIF_F_SG.
- iwlwifi: mvm: Align bt-coex priority with requirements.
- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface.
- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning.
- iwlwifi: mvm: avoid panics with thermal device usage.
- iwlwifi: mvm: avoid to WARN about gscan capabilities.
- iwlwifi: mvm: bail out if CTDP start operation fails.
- iwlwifi: mvm: bump firmware API to 21.
- iwlwifi: mvm: bump max API to 20.
- iwlwifi: mvm: change access to ieee80211_hdr.
- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station.
- iwlwifi: mvm: change mcc update API.
- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk.
- iwlwifi: mvm: Change number of associated stations when station becomes associated.
- iwlwifi: mvm: change protocol offload flows.
- iwlwifi: mvm: change the check for ADD_STA status.
- iwlwifi: mvm: check FW's response for nvm access write cmd.
- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value.
- iwlwifi: mvm: check minimum temperature notification length.
- iwlwifi: mvm: cleanup roc te on restart cleanup.
- iwlwifi: mvm: Configure fragmented scan for scheduled scan.
- iwlwifi: mvm: configure scheduled scan according to traffic conditions.
- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c.
- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured.
- iwlwifi: mvm: disable DQA support.
- iwlwifi: mvm: Do not switch to D3 image on suspend.
- iwlwifi: mvm: don't ask beacons when P2P GO vif and no assoc sta.
- iwlwifi: mvm: don't keep an mvm ref when the interface is down.
- iwlwifi: mvm: don't let NDPs mess the packet tracking.
- iwlwifi: mvm: don't restart HW if suspend fails with unified image.
- iwlwifi: mvm: don't try to offload AES-CMAC in AP/IBSS modes.
- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit.
- iwlwifi: mvm: dump more registers upon error.
- iwlwifi: mvm: dump the radio registers when the firmware crashes.
- iwlwifi: mvm: enable L3 filtering.
- iwlwifi: mvm: Enable MPLUT only on supported hw.
- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware.
- iwlwifi: mvm: extend time event duration.
- iwlwifi: mvm: fix accessing Null pointer during fw dump collection.
- iwlwifi: mvm: fix d3_test with unified D0/D3 images.
- iwlwifi: mvm: fix debugfs signedness warning.
- iwlwifi: mvm: fix extended dwell time.
- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans().
- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump.
- iwlwifi: mvm: fix netdetect starting/stopping for unified images.
- iwlwifi: mvm: fix RSS key sizing.
- iwlwifi: mvm: fix unregistration of thermal in some error flows.
- iwlwifi: mvm: flush all used TX queues before suspending.
- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware doesn't support it.
- iwlwifi: mvm: handle pass all scan reporting.
- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans.
- iwlwifi: mvm: infrastructure for frame-release message.
- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq.
- iwlwifi: mvm: let the firmware choose the antenna for beacons.
- iwlwifi: mvm: make collecting fw debug data optional.
- iwlwifi: mvm: move fw-dbg code to separate file.
- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw.
- iwlwifi: mvm: prepare the code towards TSO implementation.
- iwlwifi: mvm: refactor d3 key update functions.
- iwlwifi: mvm: refactor the way fw_key_table is handled.
- iwlwifi: mvm: remove an extra tab.
- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs.
- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort.
- iwlwifi: mvm: remove redundant d0i3 flag from the config struct.
- iwlwifi: mvm: remove shadowing variable.
- iwlwifi: mvm: remove stray nd_config element.
- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter().
- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported().
- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211's combination.
- iwlwifi: mvm: report wakeup for wowlan.
- iwlwifi: mvm: reset mvm->scan_type when firmware is started.
- iwlwifi: mvm: return the cooling state index instead of the budget.
- iwlwifi: mvm: ROC: cleanup time event info on FW failure.
- iwlwifi: mvm: ROC: Extend the ROC max delay duration & limit ROC duration.
- iwlwifi: mvm: rs: fix a potential out of bounds access.
- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements.
- iwlwifi: mvm: rs: fix a warning message.
- iwlwifi: mvm: rs: fix TPC action decision algorithm.
- iwlwifi: mvm: rs: fix TPC statistics handling.
- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed.
- iwlwifi: mvm: set default new STA as non-aggregated.
- iwlwifi: mvm: set the correct amsdu enum values.
- iwlwifi: mvm: set the correct descriptor size for tracing.
- iwlwifi: mvm: small update in the firmware API.
- iwlwifi: mvm: support A-MSDU in A-MPDU.
- iwlwifi: mvm: support beacon storing.
- iwlwifi: mvm: support description for user triggered fw dbg collection.
- iwlwifi: mvm: support rss queues configuration command.
- iwlwifi: mvm: Support setting continuous recording debug mode.
- iwlwifi: mvm: support setting minimum quota from debugfs.
- iwlwifi: mvm: support sw queue start/stop from mvm.
- iwlwifi: mvm: take care of padded packets.
- iwlwifi: mvm: take the transport ref back when leaving.
- iwlwifi: mvm: track low-latency sources separately.
- iwlwifi: mvm: update GSCAN capabilities.
- iwlwifi: mvm: update ucode status before stopping device.
- iwlwifi: mvm: use build-time assertion for fw trigger ID.
- iwlwifi: mvm: use firmware station lookup, combine code.
- iwlwifi: mvm: various trivial cleanups.
- iwlwifi: mvm: writing zero bytes to debugfs causes a crash.
- iwlwifi: nvm: fix loading default NVM file.
- iwlwifi: nvm: fix up phy section when reading it.
- iwlwifi: pcie: add 9000 series multi queue rx DMA support.
- iwlwifi: pcie: add infrastructure for multi-queue rx.
- iwlwifi: pcie: add initial RTPM support for PCI.
- iwlwifi: pcie: Add new configuration to enable MSIX.
- iwlwifi: pcie: add pm_prepare and pm_complete ops.
- iwlwifi: pcie: add RTPM support when wifi is enabled.
- iwlwifi: pcie: aggregate Flow Handler configuration writes.
- iwlwifi: pcie: allow the op_mode to block the tx queues.
- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug.
- iwlwifi: pcie: avoid restocks inside rx loop if not emergency.
- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues.
- iwlwifi: pcie: build an A-MSDU using TSO core.
- iwlwifi: pcie: configure more RFH settings.
- iwlwifi: pcie: detect and workaround invalid write ptr behavior.
- iwlwifi: pcie: don't increment / decrement a bool.
- iwlwifi: pcie: enable interrupts before releasing the NIC's CPU.
- iwlwifi: pcie: enable multi-queue rx path.
- iwlwifi: pcie: extend device reset delay.
- iwlwifi: pcie: fine tune number of rxbs.
- iwlwifi: pcie: fix a race in firmware loading flow.
- iwlwifi: pcie: fix erroneous return value.
- iwlwifi: pcie: fix global table size.
- iwlwifi: pcie: fix identation in trans.c.
- iwlwifi: pcie: fix RF-Kill vs. firmware load race.
- iwlwifi: pcie: forbid RTPM on device removal.
- iwlwifi: pcie: mark command queue lock with separate lockdep class.
- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim.
- iwlwifi: pcie: refactor RXBs reclaiming code.
- iwlwifi: pcie: remove ICT allocation message.
- iwlwifi: pcie: remove pointer from debug message.
- iwlwifi: pcie: re-organize code towards TSO.
- iwlwifi: pcie: set RB chunk size back to 64.
- iwlwifi: pcie: update iwl_mpdu_desc fields.
- iwlwifi: print index in api/capa flags parsing message.
- iwlwifi: refactor the code that reads the MAC address from the NVM.
- iwlwifi: remove IWL_DL_LED.
- iwlwifi: remove unused parameter from grab_nic_access.
- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables.
- iwlwifi: set max firmware version of 7265 to 17.
- iwlwifi: support ucode with d0 unified image - regular and usniffer.
- iwlwifi: trans: make various conversion macros inlines.
- iwlwifi: trans: support a callback for ASYNC commands.
- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian.
- iwlwifi: tt: move ucode_loaded check under mutex.
- iwlwifi: uninline iwl_trans_send_cmd.
- iwlwifi: update host command messages to new format.
- iwlwifi: Update PCI IDs for 8000 and 9000 series.
- iwlwifi: update support for 3168 series firmware and NVM.
- iwlwifi: various comments and code cleanups.
- kabi: ignore fs_info parameter for tracepoints that didn't have it (bsc#1044912).
- kabi/severities: ignore kABi changes in iwlwifi stuff itself
- lan78xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).
- Linux 4.4.74 (CVE-2017-1000364 bnc#1012382 bnc#1039348 bnc#1045340 bsc#1031717 bsc#1043231).
- loop: Add PF_LESS_THROTTLE to block/loop device thread (bsc#1027101).
- md: fix a null dereference (bsc#1040351).
- md: use a separate bio_set for synchronous IO (bsc#1040351).
- mm: fix new crash in unmapped_area_topdown() (bnc#1039348).
- mm: larger stack guard gap, between vmas (bnc#1039348, CVE-2017-1000364, bnc#1045340).
- net/mlx5e: Fix timestamping capabilities reporting (bsc#966170 bsc#1015342).
- NFSv4: don't let hanging mounts block other mounts (bsc#1040364).
- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609).
- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669).
- powerpc/fadump: avoid holes in boot memory area when fadump is registered (bsc#1037669).
- powerpc/fadump: provide a helpful error message (bsc#1037669).
- powerpc/fadump: return error when fadump registration fails (bsc#1040567).
- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).
- printk: Correctly handle preemption in console_unlock() (bsc#1046434).
- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).
- RDMA/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).
- Reenable and refresh patches.suse/iwlwifi-expose-default-fallback-ucode-api.
- reiserfs: don't preallocate blocks for extended attributes (bsc#990682).
- smartpqi: limit transfer length to 1MB (bsc#1025461).
- tty: Destroy ldisc instance on hangup (bnc#1043488).
- tty: Fix ldisc crash on reopened tty (bnc#1043488).
- tty: Handle NULL tty->ldisc (bnc#1043488).
- tty: Move tty_ldisc_kill() (bnc#1043488).
- tty: Prepare for destroying line discipline on hangup (bnc#1043488).
- tty: Refactor tty_ldisc_reinit() for reuse (bnc#1043488).
- tty: Reset c_line from driver's init_termios (bnc#1043488).
- tty: Simplify tty_set_ldisc() exit handling (bnc#1043488).
- tty: Use 'disc' for line discipline index name (bnc#1043488).
- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)
- Update patches.fixes/xfs-split-default-quota-limits-by-quota-type.patch (bsc#1040941). Fix the bug nr used.
Patchnames
SUSE-SLE-RT-12-SP2-2017-1231
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP2 Realtime kernel was updated to 4.4.74 to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n\n- CVE-2017-1000364: An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \u0027jumped\u0027 over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010) (bnc#1039348).\n- CVE-2017-1000365: The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but did not take the argument and environment pointers into account, which allowed attackers to bypass this limitation. (bnc#1039354).\n- CVE-2017-1000380: sound/core/timer.c in the Linux kernel is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time (bnc#1044125).\n- CVE-2017-7346: The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate certain levels data, which allowed local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031796).\n- CVE-2017-9242: The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel is too late in checking whether an overwrite of an skb data structure may occur, which allowed local users to cause a denial of service (system crash) via crafted system calls (bnc#1041431).\n- CVE-2017-9076: The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039885).\n- CVE-2017-9077: The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1040069).\n- CVE-2017-9075: The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel mishandled inheritance, which allowed local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890 (bnc#1039883).\n- CVE-2017-9074: The IPv6 fragmentation implementation in the Linux kernel did not consider that the nexthdr field may be associated with an invalid option, which allowed local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls (bnc#1039882).\n- CVE-2017-7487: The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel mishandled reference counts, which allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface (bnc#1038879).\n- CVE-2017-8890: The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel allowed attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call (bnc#1038544).\n- CVE-2017-9150: The do_check function in kernel/bpf/verifier.c in the Linux kernel did not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allowed local users to obtain sensitive address information via crafted bpf system calls (bnc#1040279).\n- CVE-2017-7618: crypto/ahash.c in the Linux kernel allowed attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue (bnc#1033340).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2017-7616: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel allowed local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation (bnc#1033336).\n- CVE-2017-2671: The ping_unhash function in net/ipv4/ping.c in the Linux kernel is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allowed local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call (bnc#1031003).\n- CVE-2017-7184: The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel did not validate certain size data after an XFRM_MSG_NEWAE update, which allowed local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52 (bnc#1030573).\n- CVE-2017-7308: The packet_set_ring function in net/packet/af_packet.c in the Linux kernel did not properly validate certain block-size data, which allowed local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls (bnc#1031579).\n- CVE-2017-7294: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not validate addition of certain levels data, which allowed local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031440).\n- CVE-2017-7261: The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel did not check for a zero value of certain levels data, which allowed local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device (bnc#1031052).\n- CVE-2017-7187: The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel allowed local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function (bnc#1030213).\n- CVE-2017-7374: Use-after-free vulnerability in fs/crypto/ in the Linux kernel allowed local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely (bnc#1032006).\n- CVE-2016-10200: Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c (bnc#1028415).\n- CVE-2017-2636: Race condition in drivers/tty/n_hdlc.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline (bnc#1027565).\n- CVE-2017-6345: The LLC subsystem in the Linux kernel did not ensure that a certain destructor exists in required circumstances, which allowed local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls (bnc#1027190).\n- CVE-2017-6346: Race condition in net/packet/af_packet.c in the Linux kernel allowed local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that made PACKET_FANOUT setsockopt system calls (bnc#1027189).\n- CVE-2017-6353: net/sctp/socket.c in the Linux kernel did not properly restrict association peel-off operations during certain wait states, which allowed local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986. (bnc#1027066).\n- CVE-2017-6214: The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel allowed remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag (bnc#1026722).\n- CVE-2016-2117: The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel incorrectly enables scatter/gather I/O, which allowed remote attackers to obtain sensitive information from kernel memory by reading packet data (bnc#968697).\n- CVE-2017-6347: The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel has incorrect expectations about skb data layout, which allowed local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission (bnc#1027179).\n- CVE-2016-9191: The cgroup offline implementation in the Linux kernel mishandled certain drain operations, which allowed local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity (bnc#1008842).\n- CVE-2017-2583: The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel improperly emulates a \u0027MOV SS, NULL selector\u0027 instruction, which allowed guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application (bnc#1020602).\n- CVE-2017-2584: arch/x86/kvm/emulate.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt (bnc#1019851).\n- CVE-2017-2596: The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel improperly emulates the VMXON instruction, which allowed KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references (bnc#1022785).\n- CVE-2017-6074: The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel mishandled DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allowed local users to obtain root privileges or cause a denial of service (double free) via an application that made an IPV6_RECVPKTINFO setsockopt system call (bnc#1026024).\n- CVE-2017-5986: Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel allowed local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state (bnc#1025235).\n- CVE-2017-5970: The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel allowed attackers to cause a denial of service (system crash) via (1) an application that made crafted system calls or possibly (2) IPv4 traffic with invalid IP options (bnc#1024938).\n- CVE-2017-5897: The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allowed remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access (bnc#1023762).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2017-5576: Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call (bnc#1021294).\n- CVE-2017-5577: The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel did not set an errno value upon certain overflow detections, which allowed local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call (bnc#1021294).\n- CVE-2017-5551: The simple_set_acl function in fs/posix_acl.c in the Linux kernel preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097. (bnc#1021258).\n\nThe following non-security bugs were fixed:\n\n- 9p: fix a potential acl leak (4.4.68 stable queue).\n- acpi / APEI: Add missing synchronize_rcu() on NOTIFY_SCI removal (bsc#1031717).\n- acpi: Do not create a platform_device for IOAPIC/IOxAPIC (bsc#1028819).\n- acpi, ioapic: Clear on-stack resource before using it (bsc#1028819).\n- acpi, nfit: fix acpi_nfit_flush_probe() crash (bsc#1031717).\n- acpi, nfit: fix bus vs dimm confusion in xlat_status (bsc#1023175).\n- acpi, nfit: fix extended status translations for ACPI DSMs (bsc#1031717).\n- acpi, nfit, libnvdimm: fix / harden ars_status output length handling (bsc#1023175).\n- acpi, nfit: validate ars_status output buffer size (bsc#1023175).\n- acpi: Remove platform devices from a bus on removal (bsc#1028819).\n- acpi / scan: Drop support for force_remove (bnc#1029607).\n- ahci: disable correct irq for dummy ports (bsc#1040125).\n- alsa: hda - Fix deadlock of controller device lock at unbinding (4.4.68 stable queue).\n- arm64: hugetlb: fix the wrong address for several functions (bsc#1032681).\n- arm64: hugetlb: fix the wrong return value for huge_ptep_set_access_flags (bsc#1032681).\n- arm64: hugetlb: remove the wrong pmd check in find_num_contig() (bsc#1032681).\n- arm64/numa: fix incorrect log for memory-less node (bsc#1019631).\n- arm64: Use full path in KBUILD_IMAGE definition (bsc#1010032).\n- arm: 8452/3: PJ4: make coprocessor access sequences buildable in Thumb2 mode (4.4.68 stable queue).\n- arm: OMAP5 / DRA7: Fix HYP mode boot for thumb2 build (4.4.68 stable queue).\n- arm: Use full path in KBUILD_IMAGE definition (bsc#1010032).\n- ASoC: cht_bsw_rt5645: Fix leftover kmalloc (bsc#1010690).\n- ASoC: Intel: Skylake: Uninitialized variable in probe_codec() (bsc#1043231).\n- ASoC: rt5640: use msleep() for long delays (bsc#1031717).\n- ASoC: sti: Fix error handling if of_clk_get() fails (bsc#1031717).\n- avoid including \u0027mountproto=\u0027 with no protocol in /proc/mounts (bsc#1019260).\n- bcache: fix calling ida_simple_remove() with incorrect minor (bsc#1038085).\n- bcache: Make gc wakeup sane, remove set_task_state() (bsc#1021260).\n- bcache: partition support: add 16 minors per bcacheN device (bsc#1019784).\n- blacklist 61e8a0d5a027 powerpc/pci: Fix endian bug in fixed PHB numbering (bsc#989311)\n- blacklist.conf: a04a480d4392 net: Require exact match for TCP socket lookups if dif is l3mdev (v4.9-rc4) 10/11 conflicts are with code introduced by 74b20582ac38 (\u0027net: l3mdev: Add hook in ip and ipv6\u0027, v4.7-rc1) which is not present in SP2. I think that either the problem was always there or was introduced by 74b20582ac38. If in the first case, the fix would have to be implemented differently; if in the second case, the fix is not needed in SP2.\n- blacklist.conf: blacklist reverted commit Commit 82486aa6f1b9 (\u0027ipv4: restore rt-\u0026gt;fi for reference counting\u0027) was later reverted and replaced by commit 3fb07daff8e9 (\u0027ipv4: add reference counting to metrics\u0027). This solution breaks kABI, though, and I\u0027ll need to look into it more carefully to see if it can be worked around easily.\n- blk-mq: Allow timeouts to run while queue is freezing (bsc#1020817).\n- blk-mq: Always schedule hctx-\u003enext_cpu (bsc#1020817).\n- blk-mq: Avoid memory reclaim when remapping queues (bsc#1020817).\n- blk-mq: do not overwrite rq-\u003emq_ctx (bsc#1020817).\n- blk-mq: Fix failed allocation path when mapping queues (bsc#1020817).\n- blk-mq: improve warning for running a queue on the wrong CPU (bsc#1020817).\n- block: Change extern inline to static inline (bsc#1023175).\n- block: copy NOMERGE flag from bio to request (bsc#1030070).\n- block: get rid of blk_integrity_revalidate() (4.4.68 stable queue).\n- bluetooth: btmrvl: fix hung task warning dump (bsc#1018813).\n- bna: add missing per queue ethtool stat (bsc#966321 FATE#320156).\n- bna: avoid writing uninitialized data into hw registers (bsc#966321 FATE#320156).\n- bna: integer overflow bug in debugfs (bsc#966321 FATE#320156).\n- bnx2x: allow adding VLANs while interface is down (bsc#1027273).\n- bnx2x: Correct ringparam estimate when DOWN (bsc#1020214).\n- bnxt_en: allocate enough space for -\u003entp_fltr_bmap (bsc#1020412 FATE#321671).\n- bonding: avoid defaulting hard_header_len to ETH_HLEN on slave removal (bsc#1042286).\n- bonding: do not use stale speed and duplex information (bsc#1042286).\n- bonding: fix 802.3ad aggregator reselection (bsc#1029514).\n- bonding: prevent out of bound accesses (bsc#1042286).\n- bpf, arm64: fix jit branch offset related to ldimm64 (4.4.68 stable queue).\n- brcmfmac: add fallback for devices that do not report per-chain values (bsc#1043231).\n- brcmfmac: avoid writing channel out of allocated array (bsc#1043231).\n- brcmfmac: Change error print on wlan0 existence (bsc#1000092).\n- brcmfmac: Ensure pointer correctly set if skb data location changes (4.4.68 stable queue).\n- brcmfmac: Make skb header writable before use (4.4.68 stable queue).\n- brcmfmac: restore stopping netdev queue when bus clogs up (bsc#1031717).\n- btrfs: add a flags field to btrfs_fs_info (bsc#1012452).\n- btrfs: add ASSERT for block group\u0027s memory leak (bsc#1012452).\n- btrfs: add btrfs_trans_handle-\u003efs_info pointer (bsc#1012452).\n- btrfs: add bytes_readonly to the spaceinfo at once (bsc#1012452).\n- btrfs: add check to sysfs handler of label (bsc#1012452).\n- btrfs: add dynamic debug support (bsc#1012452).\n- btrfs: add error handling for extent buffer in print tree (bsc#1012452).\n- btrfs: add missing bytes_readonly attribute file in sysfs (bsc#1012452).\n- btrfs: add missing check for writeback errors on fsync (bsc#1012452).\n- btrfs: add more validation checks for superblock (bsc#1012452).\n- btrfs: Add ratelimit to btrfs printing (bsc#1012452).\n- btrfs: add read-only check to sysfs handler of features (bsc#1012452).\n- btrfs: add semaphore to synchronize direct IO writes with fsync (bsc#1012452).\n- btrfs: add support for RENAME_EXCHANGE and RENAME_WHITEOUT (bsc#1020975).\n- btrfs: add tracepoint for adding block groups (bsc#1012452).\n- btrfs: add tracepoints for flush events (bsc#1012452).\n- btrfs: add transaction space reservation tracepoints (bsc#1012452).\n- btrfs: add validadtion checks for chunk loading (bsc#1012452).\n- btrfs: add write protection to SET_FEATURES ioctl (bsc#1012452).\n- btrfs: allow balancing to dup with multi-device (bsc#1012452).\n- btrfs: allow unlink to exceed subvolume quota (bsc#1019614).\n- btrfs: always reserve metadata for delalloc extents (bsc#1012452).\n- btrfs: always use trans-\u0026gt;block_rsv for orphans (bsc#1012452).\n- btrfs: avoid blocking open_ctree from cleaner_kthread (bsc#1012452).\n- btrfs: avoid deadlocks during reservations in btrfs_truncate_block (bsc#1012452).\n- btrfs: avoid overflowing f_bfree (bsc#1012452).\n- btrfs: avoid uninitialized variable warning (bsc#1012452).\n- btrfs: backref: Fix soft lockup in __merge_refs function (bsc#1017641).\n- btrfs: btrfs_abort_transaction, drop root parameter (bsc#1012452).\n- btrfs: __btrfs_buffered_write: Pass valid file offset when releasing delalloc space (bsc#1012452).\n- btrfs: __btrfs_buffered_write: Reserve/release extents aligned to block size (bsc#1012452).\n- btrfs: btrfs_check_super_valid: Allow 4096 as stripesize (bsc#1012452).\n- btrfs: btrfs_debug should consume fs_info when DEBUG is not defined (bsc#1012452).\n- btrfs: btrfs_ioctl_clone: Truncate complete page after performing clone operation (bsc#1012452).\n- btrfs: btrfs_page_mkwrite: Reserve space in sectorsized units (bsc#1012452).\n- btrfs: btrfs_relocate_chunk pass extent_root to btrfs_end_transaction (bsc#1012452).\n- btrfs: btrfs_submit_direct_hook: Handle map_length \u0026lt; bio vector length (bsc#1012452).\n- btrfs: build fixup for qgroup_account_snapshot (bsc#1012452).\n- btrfs: change BUG_ON()\u0027s to ASSERT()\u0027s in backref_cache_cleanup() (bsc#1012452).\n- btrfs: change delayed reservation fallback behavior (bsc#1012452).\n- btrfs: change how we calculate the global block rsv (bsc#1012452).\n- btrfs: change how we update the global block rsv (bsc#1012452).\n- btrfs: Change qgroup_meta_rsv to 64bit (bsc#1019614).\n- btrfs: check btree node\u0027s nritems (bsc#1012452).\n- btrfs: check if extent buffer is aligned to sectorsize (bsc#1012452).\n- btrfs: check inconsistence between chunk and block group (bsc#1012452).\n- btrfs: check reserved when deciding to background flush (bsc#1012452).\n- btrfs: clarify do_chunk_alloc()\u0027s return value (bsc#1012452).\n- btrfs: Clean pte corresponding to page straddling i_size (bsc#1012452).\n- btrfs: clean the old superblocks before freeing the device (bsc#1012452).\n- btrfs: clean up and optimize __check_raid_min_device() (bsc#1012452).\n- btrfs: cleanup assigning next active device with a check (bsc#1012452).\n- btrfs: cleanup BUG_ON in merge_bio (bsc#1012452).\n- btrfs: Cleanup compress_file_range() (bsc#1012452).\n- btrfs: cleanup error handling in extent_write_cached_pages (bsc#1012452).\n- btrfs: clear uptodate flags of pages in sys_array eb (bsc#1012452).\n- btrfs: clone: use vmalloc only as fallback for nodesize bufer (bsc#1012452).\n- btrfs: Compute and look up csums based on sectorsized blocks (bsc#1012452).\n- btrfs: convert nodesize macros to static inlines (bsc#1012452).\n- btrfs: convert printk(KERN_* to use pr_* calls (bsc#1012452).\n- btrfs: convert pr_* to btrfs_* where possible (bsc#1012452).\n- btrfs: convert send\u0027s verbose_printk to btrfs_debug (bsc#1012452).\n- btrfs: copy_to_sk drop unused root parameter (bsc#1012452).\n- btrfs: create a helper function to read the disk super (bsc#1012452).\n- btrfs: create example debugfs file only in debugging build (bsc#1012452).\n- btrfs: create helper btrfs_find_device_by_user_input() (bsc#1012452).\n- btrfs: create helper function __check_raid_min_devices() (bsc#1012452).\n- btrfs: csum_tree_block: return proper errno value (bsc#1012452).\n- btrfs: detect corruption when non-root leaf has zero item (bsc#1012452).\n- btrfs: device add and remove: use GFP_KERNEL (bsc#1012452).\n- btrfs: Direct I/O read: Work on sectorsized blocks (bsc#1012452).\n- btrfs: divide btrfs_update_reserved_bytes() into two functions (bsc#1012452).\n- btrfs: do not background blkdev_put() (bsc#1012452).\n- btrfs: do not bother kicking async if there\u0027s nothing to reclaim (bsc#1012452).\n- btrfs: do not BUG_ON() in btrfs_orphan_add (bsc#1012452).\n- btrfs: do not create empty block group if we have allocated data (bsc#1012452).\n- btrfs: do not decrease bytes_may_use when replaying extents (bsc#1012452).\n- btrfs: do not do nocow check unless we have to (bsc#1012452).\n- btrfs: do not do unnecessary delalloc flushes when relocating (bsc#1012452).\n- btrfs: do not force mounts to wait for cleaner_kthread to delete one or more subvolumes (bsc#1012452).\n- btrfs: do not wait for unrelated IO to finish before relocation (bsc#1012452).\n- btrfs: do not WARN() in btrfs_transaction_abort() for IO errors (bsc#1035866).\n- btrfs: do not write corrupted metadata blocks to disk (bsc#1012452).\n- btrfs: end transaction if we abort when creating uuid root (bsc#1012452).\n- btrfs: enhance btrfs_find_device_by_user_input() to check device path (bsc#1012452).\n- btrfs: error out if generic_bin_search get invalid arguments (bsc#1012452).\n- btrfs: expand cow_file_range() to support in-band dedup and subpage-blocksize (bsc#1012452).\n- btrfs: extend btrfs_set_extent_delalloc and its friends to support in-band dedupe and subpage size patchset (bsc#1012452).\n- btrfs: extent same: use GFP_KERNEL for page array allocations (bsc#1012452).\n- btrfs: fallback to vmalloc in btrfs_compare_tree (bsc#1012452).\n- btrfs: fallocate: use GFP_KERNEL (bsc#1012452).\n- btrfs: fallocate: Work with sectorsized blocks (bsc#1012452).\n- btrfs: fill relocation block rsv after allocation (bsc#1012452).\n- btrfs: fix an integer overflow check (bsc#1012452).\n- btrfs: fix a possible umount deadlock (bsc#1012452).\n- btrfs: Fix block size returned to user space (bsc#1012452).\n- btrfs: fix btrfs_compat_ioctl failures on non-compat ioctls (bsc#1018100).\n- btrfs: fix btrfs_no_printk stub helper (bsc#1012452).\n- btrfs: Fix BUG_ON condition in scrub_setup_recheck_block() (bsc#1012452).\n- btrfs: fix BUG_ON in btrfs_mark_buffer_dirty (bsc#1012452).\n- btrfs: fix BUG_ON in btrfs_submit_compressed_write (bsc#1012452).\n- btrfs: fix build warning (bsc#1012452).\n- btrfs: fix callers of btrfs_block_rsv_migrate (bsc#1012452).\n- btrfs: fix check_direct_IO() for non-iovec iterators (bsc#1012452).\n- btrfs: fix check_shared for fiemap ioctl (bsc#1037177).\n- btrfs: fix crash when tracepoint arguments are freed by wq callbacks (bsc#1012452).\n- btrfs: fix data loss after truncate when using the no-holes feature (bsc#1036214).\n- btrfs: fix deadlock in delayed_ref_async_start (bsc#1012452).\n- btrfs: fix delalloc accounting after copy_from_user faults (bsc#1012452).\n- btrfs: fix delalloc reservation amount tracepoint (bsc#1012452).\n- btrfs: fix disk_i_size update bug when fallocate() fails (bsc#1012452).\n- btrfs: fix divide error upon chunk\u0027s stripe_len (bsc#1012452).\n- btrfs: fix double free of fs root (bsc#1012452).\n- btrfs: fix eb memory leak due to readpage failure (bsc#1012452).\n- btrfs: fix em leak in find_first_block_group (bsc#1012452).\n- btrfs: fix emptiness check for dirtied extent buffers at check_leaf() (bsc#1012452).\n- btrfs: fix error handling in map_private_extent_buffer (bsc#1012452).\n- btrfs: fix error return code in btrfs_init_test_fs() (bsc#1012452).\n- btrfs: fix extent_same allowing destination offset beyond i_size (bsc#1012452).\n- btrfs: fix free space calculation in dump_space_info() (bsc#1012452).\n- btrfs: fix fsfreeze hang caused by delayed iputs deal (bsc#1012452).\n- btrfs: fix fspath error deallocation (bsc#1012452).\n- btrfs: fix handling of faults from btrfs_copy_from_user (bsc#1012452).\n- btrfs: fix inode leak on failure to setup whiteout inode in rename (bsc#1020975).\n- btrfs: fix int32 overflow in shrink_delalloc() (bsc#1012452).\n- btrfs: Fix integer overflow when calculating bytes_per_bitmap (bsc#1012452).\n- btrfs: fix invalid dereference in btrfs_retry_endio (bsc#1040395).\n- btrfs: fix invalid reference in replace_path (bsc#1012452).\n- btrfs: fix listxattrs not listing all xattrs packed in the same item (bsc#1012452).\n- btrfs: fix lockdep deadlock warning due to dev_replace (bsc#1012452).\n- btrfs: fix lockdep warning about log_mutex (bsc#1021455).\n- btrfs: fix lock dep warning, move scratch dev out of device_list_mutex and uuid_mutex (bsc#1012452).\n- btrfs: fix lock dep warning move scratch super outside of chunk_mutex (bsc#1012452).\n- btrfs: fix lockdep warning on deadlock against an inode\u0027s log mutex (bsc#1021455).\n- btrfs: fix __MAX_CSUM_ITEMS (bsc#1012452).\n- btrfs: fix memory leak during RAID 5/6 device replacement (bsc#1012452).\n- btrfs: fix memory leak of block group cache (bsc#1012452).\n- btrfs: fix memory leak of reloc_root (bsc#1012452).\n- btrfs: fix mixed block count of available space (bsc#1012452).\n- btrfs: fix number of transaction units for renames with whiteout (bsc#1020975).\n- btrfs: fix one bug that process may endlessly wait for ticket in wait_reserve_ticket() (bsc#1012452).\n- btrfs: fix panic in balance due to EIO (bsc#1012452).\n- btrfs: fix race between block group relocation and nocow writes (bsc#1012452).\n- btrfs: fix race between device replace and block group removal (bsc#1012452).\n- btrfs: fix race between device replace and chunk allocation (bsc#1012452).\n- btrfs: fix race between device replace and discard (bsc#1012452).\n- btrfs: fix race between device replace and read repair (bsc#1012452).\n- btrfs: fix race between fsync and direct IO writes for prealloc extents (bsc#1012452).\n- btrfs: fix race between readahead and device replace/removal (bsc#1012452).\n- btrfs: fix race setting block group back to RW mode during device replace (bsc#1012452).\n- btrfs: fix race setting block group readonly during device replace (bsc#1012452).\n- btrfs: fix read_node_slot to return errors (bsc#1012452).\n- btrfs: fix release reserved extents trace points (bsc#1012452).\n- btrfs: fix segmentation fault when doing dio read (bsc#1040425).\n- btrfs: Fix slab accounting flags (bsc#1012452).\n- btrfs: fix truncate_space_check (bsc#1012452).\n- btrfs: fix unexpected return value of fiemap (bsc#1012452).\n- btrfs: fix unprotected assignment of the left cursor for device replace (bsc#1012452).\n- btrfs: fix WARNING in btrfs_select_ref_head() (bsc#1012452).\n- btrfs: flush_space: treat return value of do_chunk_alloc properly (bsc#1012452).\n- btrfs: Force stripesize to the value of sectorsize (bsc#1012452).\n- btrfs: free sys_array eb as soon as possible (bsc#1012452).\n- btrfs: GFP_NOFS does not GFP_HIGHMEM (bsc#1012452).\n- btrfs: Handle uninitialised inode eviction (bsc#1012452).\n- btrfs: hide test-only member under ifdef (bsc#1012452).\n- btrfs: improve check_node to avoid reading corrupted nodes (bsc#1012452).\n- btrfs: Improve FL_KEEP_SIZE handling in fallocate (bsc#1012452).\n- btrfs: incremental send, do not delay rename when parent inode is new (bsc#1028325).\n- btrfs: incremental send, do not issue invalid rmdir operations (bsc#1028325).\n- btrfs: introduce BTRFS_MAX_ITEM_SIZE (bsc#1012452).\n- btrfs: introduce device delete by devid (bsc#1012452).\n- btrfs: introduce raid-type to error-code table, for minimum device constraint (bsc#1012452).\n- btrfs: introduce ticketed enospc infrastructure (bsc#1012452).\n- btrfs: introduce tickets_id to determine whether asynchronous metadata reclaim work makes progress (bsc#1012452).\n- btrfs: ioctl: reorder exclusive op check in RM_DEV (bsc#1012452).\n- btrfs: kill BUG_ON in do_relocation (bsc#1012452).\n- btrfs: kill BUG_ON in run_delayed_tree_ref (bsc#1012452).\n- btrfs: kill BUG_ON()\u0027s in btrfs_mark_extent_written (bsc#1012452).\n- btrfs: kill invalid ASSERT() in process_all_refs() (bsc#1012452).\n- btrfs: kill the start argument to read_extent_buffer_pages (bsc#1012452).\n- btrfs: kill unused writepage_io_hook callback (bsc#1012452).\n- btrfs: let callers of btrfs_alloc_root pass gfp flags (bsc#1012452).\n- btrfs: Limit inline extents to root-\u0026gt;sectorsize (bsc#1012452).\n- btrfs: make find_workspace always succeed (bsc#1012452).\n- btrfs: make find_workspace warn if there are no workspaces (bsc#1012452).\n- btrfs: make mapping-\u0026gt;writeback_index point to the last written page (bsc#1012452).\n- btrfs: make state preallocation more speculative in __set_extent_bit (bsc#1012452).\n- btrfs: make sure device is synced before return (bsc#1012452).\n- btrfs: make sure we stay inside the bvec during __btrfs_lookup_bio_sums (bsc#1012452).\n- btrfs: make use of btrfs_find_device_by_user_input() (bsc#1012452).\n- btrfs: make use of btrfs_scratch_superblocks() in btrfs_rm_device() (bsc#1012452).\n- btrfs: memset to avoid stale content in btree leaf (bsc#1012452).\n- btrfs: memset to avoid stale content in btree node block (bsc#1012452).\n- btrfs: move error handling code together in ctree.h (bsc#1012452).\n- btrfs: optimize check for stale device (bsc#1012452).\n- btrfs: Output more info for enospc_debug mount option (bsc#1012452).\n- btrfs: parent_start initialization cleanup (bsc#1012452).\n- btrfs: pass correct args to btrfs_async_run_delayed_refs() (bsc#1012452).\n- btrfs: pass number of devices to btrfs_check_raid_min_devices (bsc#1012452).\n- btrfs: pass the right error code to the btrfs_std_error (bsc#1012452).\n- btrfs: pin log earlier when renaming (bsc#1020975).\n- btrfs: pin logs earlier when doing a rename exchange operation (bsc#1020975).\n- btrfs: preallocate compression workspaces (bsc#1012452).\n- btrfs: Print Warning only if ENOSPC_DEBUG is enabled (bsc#1012452).\n- btrfs: qgroup: Move half of the qgroup accounting time out of commit trans (bsc#1017461).\n- btrfs: qgroups: Retry after commit on getting EDQUOT (bsc#1019614).\n- btrfs: Ratelimit \u0027no csum found\u0027 info message (bsc#1012452).\n- btrfs: reada: add all reachable mirrors into reada device list (bsc#1012452).\n- btrfs: reada: Add missed segment checking in reada_find_zone (bsc#1012452).\n- btrfs: reada: Avoid many times of empty loop (bsc#1012452).\n- btrfs: reada: avoid undone reada extents in btrfs_reada_wait (bsc#1012452).\n- btrfs: reada: bypass adding extent when all zone failed (bsc#1012452).\n- btrfs: reada: Fix a debug code typo (bsc#1012452).\n- btrfs: reada: Fix in-segment calculation for reada (bsc#1012452).\n- btrfs: reada: ignore creating reada_extent for a non-existent device (bsc#1012452).\n- btrfs: reada: Jump into cleanup in direct way for __readahead_hook() (bsc#1012452).\n- btrfs: reada: limit max works count (bsc#1012452).\n- btrfs: reada: Move is_need_to_readahead contition earlier (bsc#1012452).\n- btrfs: reada: move reada_extent_put to place after __readahead_hook() (bsc#1012452).\n- btrfs: reada: Pass reada_extent into __readahead_hook directly (bsc#1012452).\n- btrfs: reada: reduce additional fs_info-\u003ereada_lock in reada_find_zone (bsc#1012452).\n- btrfs: reada: Remove level argument in severial functions (bsc#1012452).\n- btrfs: reada: simplify dev-\u003ereada_in_flight processing (bsc#1012452).\n- btrfs: reada: Use fs_info instead of root in __readahead_hook\u0027s argument (bsc#1012452).\n- btrfs: reada: use GFP_KERNEL everywhere (bsc#1012452).\n- btrfs: readdir: use GFP_KERNEL (bsc#1012452).\n- btrfs: refactor btrfs_dev_replace_start for reuse (bsc#1012452).\n- btrfs: Refactor btrfs_lock_cluster() to kill compiler warning (bsc#1012452).\n- btrfs: remove BUG() in raid56 (bsc#1012452).\n- btrfs: remove BUG_ON in start_transaction (bsc#1012452).\n- btrfs: remove BUG_ON()\u0027s in btrfs_map_block (bsc#1012452).\n- btrfs: remove build fixup for qgroup_account_snapshot (bsc#1012452).\n- btrfs: remove redundant error check (bsc#1012452).\n- btrfs: remove save_error_info() (bsc#1012452).\n- btrfs: remove unnecessary btrfs_mark_buffer_dirty in split_leaf (bsc#1012452).\n- btrfs: remove unused function btrfs_assert() (bsc#1012452).\n- btrfs: rename and document compression workspace members (bsc#1012452).\n- btrfs: rename btrfs_find_device_by_user_input (bsc#1012452).\n- btrfs: rename btrfs_std_error to btrfs_handle_fs_error (bsc#1012452).\n- btrfs: rename __check_raid_min_devices (bsc#1012452).\n- btrfs: rename flags for vol args v2 (bsc#1012452).\n- btrfs: reorg btrfs_close_one_device() (bsc#1012452).\n- btrfs: Replace -ENOENT by -ERANGE in btrfs_get_acl() (bsc#1012452).\n- btrfs: Reset IO error counters before start of device replacing (bsc#1012452).\n- btrfs: reuse existing variable in scrub_stripe, reduce stack usage (bsc#1012452).\n- btrfs: s_bdev is not null after missing replace (bsc#1012452).\n- btrfs: scrub: Set bbio to NULL before calling btrfs_map_block (bsc#1012452).\n- btrfs: scrub: use GFP_KERNEL on the submission path (bsc#1012452).\n- btrfs: Search for all ordered extents that could span across a page (bsc#1012452).\n- btrfs: send, fix failure to rename top level inode due to name collision (bsc#1028325).\n- btrfs: send: silence an integer overflow warning (bsc#1012452).\n- btrfs: send: use GFP_KERNEL everywhere (bsc#1012452).\n- btrfs: send: use temporary variable to store allocation size (bsc#1012452).\n- btrfs: send: use vmalloc only as fallback for clone_roots (bsc#1012452).\n- btrfs: send: use vmalloc only as fallback for clone_sources_tmp (bsc#1012452).\n- btrfs: send: use vmalloc only as fallback for read_buf (bsc#1012452).\n- btrfs: send: use vmalloc only as fallback for send_buf (bsc#1012452).\n- btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844 bsc#1024015)\n- btrfs: Simplify conditions about compress while mapping btrfs flags to inode flags (bsc#1012452).\n- btrfs: sink gfp parameter to clear_extent_bits (bsc#1012452).\n- btrfs: sink gfp parameter to clear_extent_dirty (bsc#1012452).\n- btrfs: sink gfp parameter to clear_record_extent_bits (bsc#1012452).\n- btrfs: sink gfp parameter to convert_extent_bit (bsc#1012452).\n- btrfs: sink gfp parameter to set_extent_bits (bsc#1012452).\n- btrfs: sink gfp parameter to set_extent_defrag (bsc#1012452).\n- btrfs: sink gfp parameter to set_extent_delalloc (bsc#1012452).\n- btrfs: sink gfp parameter to set_extent_new (bsc#1012452).\n- btrfs: sink gfp parameter to set_record_extent_bits (bsc#1012452).\n- btrfs: skip commit transaction if we do not have enough pinned bytes (bsc#1037186).\n- btrfs: subpage-blocksize: Rate limit scrub error message (bsc#1012452).\n- btrfs: switch to common message helpers in open_ctree, adjust messages (bsc#1012452).\n- btrfs: switch to kcalloc in btrfs_cmp_data_prepare (bsc#1012452).\n- btrfs: sysfs: protect reading label by lock (bsc#1012452).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: trace pinned extents (bsc#1012452).\n- btrfs: track transid for delayed ref flushing (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, document subvol flags (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, move balance flags (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, move BTRFS_LABEL_SIZE (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, move feature flags (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, move struct btrfs_ioctl_defrag_range_args (bsc#1012452).\n- btrfs: uapi/linux/btrfs.h migration, qgroup limit flags (bsc#1012452).\n- btrfs: uapi/linux/btrfs_tree.h migration, item types and defines (bsc#1012452).\n- btrfs: uapi/linux/btrfs_tree.h, use __u8 and __u64 (bsc#1012452).\n- btrfs: unpin log if rename operation fails (bsc#1020975).\n- btrfs: unpin logs if rename exchange operation fails (bsc#1020975).\n- btrfs: unsplit printed strings (bsc#1012452).\n- btrfs: untangle gotos a bit in __clear_extent_bit (bsc#1012452).\n- btrfs: untangle gotos a bit in convert_extent_bit (bsc#1012452).\n- btrfs: untangle gotos a bit in __set_extent_bit (bsc#1012452).\n- btrfs: update btrfs_space_info\u0027s bytes_may_use timely (bsc#1012452).\n- btrfs: Use correct format specifier (bsc#1012452).\n- btrfs: use correct offset for reloc_inode in prealloc_file_extent_cluster() (bsc#1012452).\n- btrfs: use dynamic allocation for root item in create_subvol (bsc#1012452).\n- btrfs: Use (eb-\u0026gt;start, seq) as search key for tree modification log (bsc#1012452).\n- btrfs: use existing device constraints table btrfs_raid_array (bsc#1012452).\n- btrfs: use FLUSH_LIMIT for relocation in reserve_metadata_bytes (bsc#1012452).\n- btrfs: use fs_info directly (bsc#1012452).\n- btrfs: use new error message helper in qgroup_account_snapshot (bsc#1012452).\n- btrfs: use proper type for failrec in extent_state (bsc#1012452).\n- btrfs: use root when checking need_async_flush (bsc#1012452).\n- btrfs: use the correct struct for BTRFS_IOC_LOGICAL_INO (bsc#1012452).\n- btrfs: Use __u64 in exported linux/btrfs.h (bsc#1012452).\n- btrfs: warn_on for unaccounted spaces (bsc#1012452).\n- ceph: check i_nlink while converting a file handle to dentry (bsc#1039864).\n- ceph: Check that the new inode size is within limits in ceph_fallocate() (bsc#1037969).\n- ceph: Correctly return NXIO errors from ceph_llseek (git-fixes).\n- ceph: fix bad endianness handling in parse_reply_info_extra (bsc#1020488).\n- ceph: fix file open flags on ppc64 (bsc#1022266).\n- ceph: fix memory leak in __ceph_setxattr() (bsc#1036763).\n- ceph: fix potential use-after-free (bsc#1043371).\n- ceph: fix recursively call between ceph_set_acl and __ceph_setattr (bsc#1034902).\n- ceph: memory leak in ceph_direct_read_write callback (bsc#1041810).\n- cfq-iosched: fix the delay of cfq_group\u0027s vdisktime under iops mode (bsc#1012829).\n- cgroup/pids: remove spurious suspicious RCU usage warning (bnc#1031831).\n- cgroup: remove redundant cleanup in css_create (bsc#1012829).\n- cifs: backport prepath matching fix (bsc#799133).\n- cifs: small underflow in cnvrtDosUnixTm() (bnc#1043935).\n- clk: Make x86/ conditional on CONFIG_COMMON_CLK (4.4.68 stable queue).\n- clk: xgene: Add PMD clock (bsc#1019351).\n- clk: xgene: Do not call __pa on ioremaped address (bsc#1019351).\n- clk: xgene: Remove CLK_IS_ROOT (bsc#1019351).\n- config: enable Ceph kernel client modules for ppc64le (fate#321098)\n- config: enable Ceph kernel client modules for s390x (fate#321098)\n- cpupower: Fix turbo frequency reporting for pre-Sandy Bridge cores (4.4.68 stable queue).\n- crypto: algif_aead - Require setkey before accept(2) (bsc#1031717).\n- crypto: algif_hash - avoid zero-sized array (bnc#1007962).\n- crypto: drbg - do not call drbg_instantiate in healt test (bsc#1018913).\n- crypto: drbg - remove FIPS 140-2 continuous test (bsc#1018913).\n- crypto: FIPS - allow tests to be disabled in FIPS mode (bsc#1018913).\n- crypto: qat - fix bar discovery for c62x (bsc#1021251).\n- crypto: qat - zero esram only for DH85x devices (1021248).\n- crypto: rsa - allow keys \u003e= 2048 bits in FIPS mode (bsc#1018913).\n- crypto: sha-mb - Fix load failure (bsc#1037384).\n- crypto: xts - consolidate sanity check for keys (bsc#1018913).\n- crypto: xts - fix compile errors (bsc#1018913).\n- cxgb4: Add control net_device for configuring PCIe VF (bsc#1021424).\n- cxgb4: Add llseek operation for flash debugfs entry (bsc#1021424).\n- cxgb4: add new routine to get adapter info (bsc#1021424).\n- cxgb4: Add PCI device ID for new adapter (bsc#1021424).\n- cxgb4: Add port description for new cards (bsc#1021424).\n- cxgb4: Add support to enable logging of firmware mailbox commands (bsc#1021424).\n- cxgb4: Check for firmware errors in the mailbox command loop (bsc#1021424).\n- cxgb4: correct device ID of T6 adapter (bsc#1021424).\n- cxgb4/cxgb4vf: Add set VF mac address support (bsc#1021424).\n- cxgb4/cxgb4vf: Allocate more queues for 25G and 100G adapter (bsc#1021424).\n- cxgb4/cxgb4vf: Assign netdev-\u003edev_port with port ID (bsc#1021424).\n- cxgb4/cxgb4vf: Display 25G and 100G link speed (bsc#1021424).\n- cxgb4/cxgb4vf: Remove deprecated module parameters (bsc#1021424).\n- cxgb4: DCB message handler needs to use correct portid to netdev mapping (bsc#1021424).\n- cxgb4: Decode link down reason code obtained from firmware (bsc#1021424).\n- cxgb4: Do not assume FW_PORT_CMD reply is always port info msg (bsc#1021424).\n- cxgb4: do not call napi_hash_del() (bsc#1021424).\n- cxgb4: Do not sleep when mbox cmd is issued from interrupt context (bsc#1021424).\n- cxgb4: Enable SR-IOV configuration via PCI sysfs interface (bsc#1021424).\n- cxgb4: Fix issue while re-registering VF mgmt netdev (bsc#1021424).\n- cxgb4: MU requested by Chelsio (bsc#1021424).\n- cxgb4: Properly decode port module type (bsc#1021424).\n- cxgb4: Refactor t4_port_init function (bsc#1021424).\n- cxgb4: Reset dcb state machine and tx queue prio only if dcb is enabled (bsc#1021424).\n- cxgb4: Support compressed error vector for T6 (bsc#1021424).\n- cxgb4: Synchronize access to mailbox (bsc#1021424).\n- cxgb4: update latest firmware version supported (bsc#1021424).\n- cxgb4vf: do not offload Rx checksums for IPv6 fragments (bsc#1026692).\n- dax: fix deadlock with DAX 4k holes (bsc#1012829).\n- dax: fix device-dax region base (bsc#1023175).\n- Delete previous two fixes for i915 (bsc#1019061). These upstream fixes brought some regressions, so better to revert for now.\n- dell-laptop: Adds support for keyboard backlight timeout AC settings (bsc#1013561).\n- device-dax: check devm_nsio_enable() return value (bsc#1023175).\n- device-dax: fail all private mapping attempts (bsc#1023175).\n- device-dax: fix percpu_ref_exit ordering (bsc#1023175).\n- device-dax: fix private mapping restriction, permit read-only (bsc#1031717).\n- Disable CONFIG_POWER_SUPPLY_DEBUG in debug kernel (bsc#1031500).\n- dmaengine: dw: fix typo in Kconfig (bsc#1031717).\n- dm: fix dm_target_io leak if clone_bio() returns an error (bsc#1040125).\n- dm-mpath: fix race window in do_end_io() (bsc#1011044).\n- dm round robin: do not use this_cpu_ptr() without having preemption disabled (bsc#1040125).\n- dm verity fec: fix block calculation (bsc#1040125).\n- dm verity fec: fix bufio leaks (bsc#1040125).\n- dm verity fec: limit error correction recursion (bsc#1040125).\n- drivers: base: dma-mapping: Fix typo in dmam_alloc_non_coherent comments (bsc#1031717).\n- drivers: hv: util: do not forget to init host_ts.lock (bsc#1031206).\n- drivers: hv: vmbus: finally fix hv_need_to_signal_on_read() (fate#320485, bug#1018385).\n- drivers: hv: vmbus: Prevent sending data on a rescinded channel (fate#320485, bug#1028217).\n- drivers: hv: vmbus: Raise retry/wait limits in vmbus_post_msg() (fate#320485, bsc#1023287, bsc#1028217).\n- drivers: net: phy: mdio-xgene: Add hardware dependency (bsc#1019351).\n- drivers: net: phy: xgene: Fix \u0027remove\u0027 function (bsc#1019351).\n- drivers: net: xgene: Add change_mtu function (bsc#1019351).\n- drivers: net: xgene: Add flow control configuration (bsc#1019351).\n- drivers: net: xgene: Add flow control initialization (bsc#1019351).\n- drivers: net: xgene: Add helper function (bsc#1019351).\n- drivers: net: xgene: Add support for Jumbo frame (bsc#1019351).\n- drivers: net: xgene: Configure classifier with pagepool (bsc#1019351).\n- drivers: net: xgene: fix build after change_mtu function change (bsc#1019351).\n- drivers: net: xgene: fix: Coalescing values for v2 hardware (bsc#1019351).\n- drivers: net: xgene: fix: Disable coalescing on v1 hardware (bsc#1019351).\n- drivers: net: xgene: Fix MSS programming (bsc#1019351).\n- drivers: net: xgene: fix: RSS for non-TCP/UDP (bsc#1019351).\n- drivers: net: xgene: fix: Use GPIO to get link status (bsc#1019351).\n- drivers: net: xgene: uninitialized variable in xgene_enet_free_pagepool() (bsc#1019351).\n- drivers/tty: 8250: only call fintek_8250_probe when doing port I/O (bsc#1031717).\n- drm: Fix broken VT switch with video=1366x768 option (bsc#1018358).\n- drm/i915: Add intel_uncore_suspend / resume functions (bsc#1011913).\n- drm/i915: Disable tv output on i9x5gm (bsc#1039700).\n- drm/i915: Do not init hpd polling for vlv and chv from runtime_suspend() (bsc#1014120).\n- drm/i915: Do not touch NULL sg on i915_gem_object_get_pages_gtt() error (bsc#1031717).\n- drm-i915-dp-Restore-PPS-HW-state-from-the-encoder-re\n- drm/i915/dp: Restore PPS HW state from the encoder resume hook (bsc#1019061).\n- drm/i915: Fix crash after S3 resume with DP MST mode change (bsc#1029634).\n- drm/i915: Fix mismatched INIT power domain disabling during suspend (bsc#1031717).\n- drm/i915: Fix watermarks for VLV/CHV (bsc#1011176).\n- drm/i915: Force VDD off on the new power seqeuencer before starting to use it (bsc#1009674).\n- drm/i915/gen9: Fix PCODE polling during CDCLK change notification (bsc#1015367).\n- drm/i915: Introduce Kabypoint PCH for Kabylake H/DT (bsc#1032581).\n- drm/i915: Listen for PMIC bus access notifications (bsc#1011913).\n- drm/i915: Mark CPU cache as dirty when used for rendering (bsc#1015367).\n- drm/i915: Mark i915_hpd_poll_init_work as static (bsc#1014120).\n- drm/i915: Nuke debug messages from the pipe update critical section (bsc#1031717).\n- drm/i915: Only enable hotplug interrupts if the display interrupts are enabled (bsc#1031717).\n- drm-i915-Prevent-PPS-stealing-from-a-normal-DP-port\n- drm/i915: Prevent PPS stealing from a normal DP port on VLV/CHV (bsc#1019061).\n- drm/i915: Program iboost settings for HDMI/DVI on SKL (bsc#1031717).\n- drm/i915: relax uncritical udelay_range() (bsc#1031717).\n- drm/i915: relax uncritical udelay_range() settings (bsc#1031717).\n- drm/i915: Use pagecache write to prepopulate shmemfs from pwrite-ioctl (bsc#1040463).\n- drm/i915/vlv: Prevent enabling hpd polling in late suspend (bsc#1014120).\n- drm/i915: Workaround for DP DPMS D3 on Dell monitor (bsc#1019061).\n- drm/mgag200: Added support for the new device G200eH3 (bsc#1007959, fate#322780)\n- drm/mgag200: Fix to always set HiPri for G200e4 (bsc#1015452, bsc#995542).\n- drm/nouveau/tmr: fully separate alarm execution/pending lists (bsc#1043467).\n- drm/ttm: fix use-after-free races in vm fault handling (4.4.68 stable queue).\n- drm/vc4: Fix an integer overflow in temporary allocation layout (bsc#1021294).\n- drm-vc4-Fix-an-integer-overflow-in-temporary-allocation-layout.patch\n- drm/vc4: Return -EINVAL on the overflow checks failing (bsc#1021294).\n- drm-vc4-Return-EINVAL-on-the-overflow-checks-failing.patch\n- drm: virtio-gpu: get the fb from the plane state for atomic updates (bsc#1023101).\n- e1000e: Do not return uninitialized stats (bug#1034635).\n- edac, xgene: Fix spelling mistake in error messages (bsc#1019351).\n- efi: Do not issue error message when booted under Xen (bnc#1036638).\n- enic: set skb-\u003ehash type properly (bsc#922871 fate#318754).\n- ext4: fix data corruption for mmap writes (bsc#1012829).\n- ext4: fix data corruption with EXT4_GET_BLOCKS_ZERO (bsc#1012829).\n- ext4: fix fencepost in s_first_meta_bg validation (bsc#1029986).\n- ext4: fix use-after-iput when fscrypt contexts are inconsistent (bsc#1012829).\n- f2fs: fix bad prefetchw of NULL page (bsc#1012829).\n- f2fs: sanity check segment count (4.4.68 stable queue).\n- Fix a regression reported by bsc#1020048 in patches.fixes/0003-md-lockless-I-O-submission-for-RAID1.patch (bsc#982783,bsc#998106,bsc#1020048).\n- fnic: Return \u0027DID_IMM_RETRY\u0027 if rport is not ready (bsc#1035920).\n- fs/block_dev: always invalidate cleancache in invalidate_bdev() (git-fixes).\n- fs: fix data invalidation in the cleancache during direct IO (git-fixes).\n- fs/xattr.c: zero out memory copied to userspace in getxattr (git-fixes).\n- ftrace: Make ftrace_location_range() global (FATE#322421).\n- fuse: fix clearing suid, sgid for chown() (bsc#1012829).\n- futex: Add missing error handling to FUTEX_REQUEUE_PI (bsc#969755).\n- futex: Fix potential use-after-free in FUTEX_REQUEUE_PI (bsc#969755).\n- gpio: xgene: make explicitly non-modular (bsc#1019351).\n- hid: usbhid: Quirk a AMI virtual mouse and keyboard with ALWAYS_POLL (bsc#1022340).\n- hv: do not reset hv_context.tsc_page on crash (fate#320485, bnc#1007729).\n- hv: export current Hyper-V clocksource (bsc#1031206).\n- hv_utils: implement Hyper-V PTP source (bsc#1031206).\n- i2c: designware-baytrail: Acquire P-Unit access on bus acquire (bsc#1011913).\n- i2c: designware-baytrail: Call pmic_bus_access_notifier_chain (bsc#1011913).\n- i2c: designware-baytrail: Fix race when resetting the semaphore (bsc#1011913).\n- i2c: designware-baytrail: Only check iosf_mbi_available() for shared hosts (bsc#1011913).\n- i2c: designware: Disable pm for PMIC i2c-bus even if there is no _SEM method (bsc#1011913).\n- i2c: designware: fix wrong Tx/Rx FIFO for ACPI (bsc#1019351).\n- i2c: designware: Implement support for SMBus block read and write (bsc#1019351).\n- i2c-designware: increase timeout (bsc#1011913).\n- i2c: designware: Never suspend i2c-busses used for accessing the system PMIC (bsc#1011913).\n- i2c: designware: Rename accessor_flags to flags (bsc#1011913).\n- i2c: xgene: Fix missing code of DTB support (bsc#1019351).\n- i40e: Be much more verbose about what we can and cannot offload (bsc#985561).\n- ib/addr: Fix setting source address in addr6_resolve() (bsc#1044082).\n- ib/core: Fix kernel crash during fail to initialize device (bsc#1022595 FATE#322350).\n- ib/core: For multicast functions, verify that LIDs are multicast LIDs (bsc#1022595 FATE#322350).\n- ib/core: If the MGID/MLID pair is not on the list return an error (bsc#1022595 FATE#322350).\n- ib/ipoib: Fix deadlock between ipoib_stop and mcast join flow (bsc#1022595 FATE#322350).\n- ib/mlx5: Assign DSCP for R-RoCE QPs Address Path (bsc#966170 bsc#966172 bsc#966191).\n- ib/mlx5: Check supported flow table size (bsc#966170 bsc#966172 bsc#966191).\n- ib/mlx5: Enlarge autogroup flow table (bsc#966170 bsc#966172 bsc#966191).\n- ib/mlx5: Fix kernel to user leak prevention logic (bsc#966170 bsc#966172 bsc#966191).\n- ibmveth: calculate gso_segs for large packets (bsc#1019148).\n- ibmveth: check return of skb_linearize in ibmveth_start_xmit (bsc#1019148).\n- ibmveth: consolidate kmalloc of array, memset 0 to kcalloc (bsc#1019148).\n- ibmveth: set correct gso_size and gso_type (bsc#1019148).\n- ibmvnic: Activate disabled RX buffer pools on reset (bsc#1044767).\n- ibmvnic: Add set_link_state routine for setting adapter link state (fate#322021, bsc#1031512).\n- ibmvnic: Allocate number of rx/tx buffers agreed on by firmware (fate#322021, bsc#1031512).\n- ibmvnic: Allocate zero-filled memory for sub crqs (fate#322021, bsc#1031512).\n- ibmvnic: Call napi_disable instead of napi_enable in failure path (fate#322021, bsc#1031512).\n- ibmvnic: Check adapter state during ibmvnic_poll (fate#322021, bsc#1040855).\n- ibmvnic: Check for driver reset first in ibmvnic_xmit (fate#322021, bsc#1038297).\n- ibmvnic: Cleanup failure path in ibmvnic_open (fate#322021, bsc#1031512).\n- ibmvnic: Clean up tx pools when closing (fate#322021, bsc#1038297).\n- ibmvnic: Client-initiated failover (bsc#1043990).\n- ibmvnic: Continue skb processing after skb completion error (fate#322021, bsc#1038297).\n- ibmvnic: Correct crq and resource releasing (fate#322021, bsc#1031512).\n- ibmvnic: Correct ibmvnic handling of device open/close (fate#322021, bsc#1031512).\n- ibmvnic: Create init and release routines for the bounce buffer (fate#322021, bsc#1031512).\n- ibmvnic: Create init and release routines for the rx pool (fate#322021, bsc#1031512).\n- ibmvnic: Create init and release routines for the tx pool (fate#322021, bsc#1031512).\n- ibmvnic: Create init/release routines for stats token (fate#322021, bsc#1031512).\n- ibmvnic: Deactivate RX pool buffer replenishment on H_CLOSED (fate#322021, bsc#1040855).\n- ibmvnic: Delete napi\u0027s when releasing driver resources (fate#322021, bsc#1038297).\n- ibmvnic: Disable irq prior to close (fate#322021, bsc#1031512).\n- ibmvnic: Do not disable IRQ after scheduling tasklet (fate#322021, bsc#1031512).\n- ibmvnic: driver initialization for kdump/kexec (bsc#1044772).\n- ibmvnic: Ensure that TX queues are disabled in __ibmvnic_close (bsc#1044767).\n- ibmvnic: Exit polling routine correctly during adapter reset (bsc#1044767).\n- ibmvnic: Fix cleanup of SKB\u0027s on driver close (fate#322021, bsc#1040855).\n- ibmvnic: Fix endian errors in error reporting output (fate#322021, bsc#1031512).\n- ibmvnic: Fix endian error when requesting device capabilities (fate#322021, bsc#1031512).\n- ibmvnic: Fix ibmvnic_change_mac_addr struct format (fate#322021, bsc#1031512).\n- ibmvnic: Fix initial MTU settings (bsc#1031512).\n- ibmvnic: fix missing unlock on error in __ibmvnic_reset() (fate#322021, bsc#1038297, Fixes: ed651a10875f).\n- ibmvnic: Fix overflowing firmware/hardware TX queue (fate#322021, bsc#1031512).\n- ibmvnic: Fixup atomic API usage (fate#322021, bsc#1031512).\n- ibmvnic: Free skb\u0027s in cases of failure in transmit (fate#322021, bsc#1031512).\n- ibmvnic: Free tx/rx scrq pointer array when releasing sub-crqs (fate#322021, bsc#1031512).\n- ibmvnic: Halt TX and report carrier off on H_CLOSED return code (fate#322021, bsc#1040855).\n- ibmvnic: Handle failover after failed init crq (fate#322021, bsc#1040855).\n- ibmvnic: Handle processing of CRQ messages in a tasklet (fate#322021, bsc#1031512).\n- ibmvnic: Initialize completion variables before starting work (fate#322021, bsc#1031512).\n- ibmvnic: Insert header on VLAN tagged received frame (fate#322021, bsc#1031512).\n- ibmvnic: Make CRQ interrupt tasklet wait for all capabilities crqs (fate#322021, bsc#1031512).\n- ibmvnic: Merge the two release_sub_crq_queue routines (fate#322021, bsc#1031512).\n- ibmvnic: Move ibmvnic adapter intialization to its own routine (fate#322021, bsc#1031512).\n- ibmvnic: Move initialization of sub crqs to ibmvnic_init (fate#322021, bsc#1031512).\n- ibmvnic: Move initialization of the stats token to ibmvnic_open (fate#322021, bsc#1031512).\n- ibmvnic: Move login and queue negotiation into ibmvnic_open (fate#322021, bsc#1031512).\n- ibmvnic: Move login to its own routine (fate#322021, bsc#1031512).\n- ibmvnic: Move queue restarting in ibmvnic_tx_complete (fate#322021, bsc#1038297).\n- ibmvnic: Move resource initialization to its own routine (fate#322021, bsc#1038297).\n- ibmvnic: Non-fatal error handling (fate#322021, bsc#1040855).\n- ibmvnic: Only retrieve error info if present (fate#322021, bsc#1031512).\n- ibmvnic: Record SKB RX queue during poll (fate#322021, bsc#1038297).\n- ibmvnic: Remove debugfs support (fate#322021, bsc#1031512).\n- ibmvnic: Remove inflight list (fate#322021, bsc#1031512).\n- ibmvnic: Remove netdev notify for failover resets (bsc#1044120).\n- ibmvnic: Remove unused bouce buffer (fate#322021, bsc#1031512).\n- ibmvnic: Remove VNIC_CLOSING check from pending_scrq (bsc#1044767).\n- ibmvnic: Replace is_closed with state field (fate#322021, bsc#1038297).\n- ibmvnic: Report errors when failing to release sub-crqs (fate#322021, bsc#1031512).\n- ibmvnic: Reset sub-crqs during driver reset (fate#322021, bsc#1040855).\n- ibmvnic: Reset the CRQ queue during driver reset (fate#322021, bsc#1040855).\n- ibmvnic: Reset tx/rx pools on driver reset (fate#322021, bsc#1040855).\n- ibmvnic: Return failure on attempted mtu change (bsc#1043236).\n- ibmvnic: Sanitize entire SCRQ buffer on reset (bsc#1044767).\n- ibmvnic: Send gratuitous arp on reset (fate#322021, bsc#1040855).\n- ibmvnic: Set real number of rx queues (fate#322021, bsc#1031512).\n- ibmvnic: Split initialization of scrqs to its own routine (fate#322021, bsc#1031512).\n- ibmvnic: Track state of adapter napis (fate#322021, bsc#1040855).\n- ibmvnic: Unmap longer term buffer before free (fate#322021, bsc#1031512).\n- ibmvnic: Updated reset handling (fate#322021, bsc#1038297).\n- ibmvnic: Update main crq initialization and release (fate#322021, bsc#1031512).\n- ibmvnic: Use common counter for capabilities checks (fate#322021, bsc#1031512).\n- ibmvnic: use max_mtu instead of req_mtu for MTU range check (bsc#1031512).\n- ibmvnic: Validate napi exist before disabling them (fate#322021, bsc#1031512).\n- ibmvnic: Wait for any pending scrqs entries at driver close (fate#322021, bsc#1038297).\n- ibmvnic: Whitespace correction in release_rx_pools (fate#322021, bsc#1038297).\n- iio: hid-sensor: Store restore poll and hysteresis on S3 (bsc#1031717).\n- infiniband: avoid dereferencing uninitialized dst on error path (git-fixes).\n- iommu/arm-smmu: Disable stalling faults for all endpoints (bsc#1038843).\n- iommu/dma: Respect IOMMU aperture when allocating (bsc#1038842).\n- iommu/exynos: Block SYSMMU while invalidating FLPD cache (bsc#1038848).\n- iommu: Handle default domain attach failure (bsc#1038846).\n- iommu/vt-d: Do not over-free page table directories (bsc#1038847).\n- iommu/vt-d: Make sure IOMMUs are off when intel_iommu=off (bsc#1031208).\n- ipv4, ipv6: ensure raw socket message is big enough to hold an IP header (4.4.68 stable queue).\n- ipv6: Do not use ufo handling on later transformed packets (bsc#1042286).\n- ipv6: fix endianness error in icmpv6_err (bsc#1042286).\n- ipv6: initialize route null entry in addrconf_init() (4.4.68 stable queue).\n- ipv6: release dst on error in ip6_dst_lookup_tail (git-fixes).\n- ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf (4.4.68 stable queue).\n- isa: Call isa_bus_init before dependent ISA bus drivers register (bsc#1031717).\n- iscsi-target: Return error if unable to add network portal (bsc#1032803).\n- iw_cxgb4: Guard against null cm_id in dump_ep/qp (bsc#1026570).\n- iwlwifi: Expose the default fallback ucode API to module info (boo#1021082, boo#1023884).\n- jump label: fix passing kbuild_cflags when checking for asm goto support (git-fixes).\n- kabi: Hide new include in arch/powerpc/kernel/process.c (fate#322421).\n- kABI: move and hide new cxgbi device owner field (bsc#1018885).\n- kABI: protect cgroup include in kernel/kthread (kabi).\n- kABI: protect struct fib_info (kabi).\n- kABI: protect struct iscsi_conn (kabi).\n- kABI: protect struct mnt_namespace (kabi).\n- kABI: protect struct musb_platform_ops (kabi).\n- kABI: protect struct pglist_data (kabi).\n- kABI: protect struct se_node_acl (kabi).\n- kABI: protect struct snd_fw_async_midi_port (kabi).\n- kABI: protect struct tcp_fastopen_cookie (kabi).\n- kABI: protect struct user_fpsimd_state (kabi).\n- kABI: protect struct wake_irq (kabi).\n- kABI: protect struct xhci_hcd (kabi).\n- kABI: protect struct xlog (bsc#1043598).\n- kABI: restore can_rx_register parameters (kabi).\n- kABI: restore ttm_ref_object_add parameters (kabi).\n- kABI workaround 4.4.65 adding #include \u003clinux/mount.h\u003e to kernel/sysctl.c\n- kabi workaround for net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).\n- kernel-binary.spec: Propagate MAKE_ARGS to %build (bsc#1012422)\n- kernel: Fix invalid domain response handling (bnc#1009718, LTC#149851).\n- kgraft/iscsi-target: Do not block kGraft in iscsi_np kthread (bsc#1010612, fate#313296).\n- kgraft/xen: Do not block kGraft in xenbus kthread (bsc#1017410, fate#313296).\n- kgr: Mark eeh_event_handler() kthread safe using a timeout (bsc#1031662).\n- kgr/module: make a taint flag module-specific (fate#313296).\n- kgr: remove all arch-specific kgraft header files (fate#313296).\n- kprobes/x86: Fix kernel panic when certain exception-handling addresses are probed (4.4.68 stable queue).\n- kvm: better MWAIT emulation for guests (bsc#1031142).\n- kvm: nVMX: do not leak PML full vmexit to L1 (4.4.68 stable queue).\n- kvm: nVMX: initialize PML fields in vmcs02 (4.4.68 stable queue).\n- kvm: svm: add support for RDTSCP (bsc#1033117).\n- l2tp: fix address test in __l2tp_ip6_bind_lookup() (bsc#1028415).\n- l2tp: fix lookup for sockets not bound to a device in l2tp_ip (bsc#1028415).\n- l2tp: fix race in l2tp_recv_common() (bsc#1042286).\n- l2tp: fix racy socket lookup in l2tp_ip and l2tp_ip6 bind() (bsc#1028415).\n- l2tp: hold socket before dropping lock in l2tp_ip{, 6}_recv() (bsc#1028415).\n- l2tp: hold tunnel socket when handling control frames in l2tp_ip and l2tp_ip6 (bsc#1028415).\n- l2tp: lock socket before checking flags in connect() (bsc#1028415).\n- leds: ktd2692: avoid harmless maybe-uninitialized warning (4.4.68 stable queue).\n- libata-scsi: Fixup ata_gen_passthru_sense() (bsc#1040125).\n- libceph: NULL deref on crush_decode() error path (bsc#1044015).\n- libcxgb: add library module for Chelsio drivers (bsc#1021424).\n- lib/mpi: mpi_read_raw_data(): fix nbits calculation (bsc#1003581).\n- lib/mpi: mpi_read_raw_data(): purge redundant clearing of nbits (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): do not include leading zero SGEs in nbytes (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): fix nbits calculation (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): fix out-of-bounds buffer access (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): purge redundant clearing of nbits (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): replace len argument by nbytes (bsc#1003581).\n- lib/mpi: mpi_read_raw_from_sgl(): sanitize meaning of indices (bsc#1003581).\n- libnvdimm, pfn: fix align attribute (bsc#1023175).\n- libnvdimm, pfn: fix memmap reservation size versus 4K alignment (bsc#1031717).\n- libnvdimm, pfn: fix \u0027npfns\u0027 vs section alignment (bsc#1040125).\n- livepatch: Allow architectures to specify an alternate ftrace location (FATE#322421).\n- locking/semaphore: Add down_interruptible_timeout() (bsc#1031662).\n- locking/ww_mutex: Fix compilation of __WW_MUTEX_INITIALIZER (bsc#1031717).\n- lpfc: remove incorrect lockdep assertion (bsc#1040125).\n- mailbox: xgene-slimpro: Fix wrong test for devm_kzalloc (bsc#1019351).\n- md: allow creation of mdNNN arrays via md_mod/parameters/new_array (bsc#1032339).\n- md.c:didn\u0027t unlock the mddev before return EINVAL in array_size_store (bsc#1038143).\n- md-cluster: convert the completion to wait queue (fate#316335).\n- md-cluster: fix potential lock issue in add_new_disk (bsc#1041087).\n- md-cluster: protect md_find_rdev_nr_rcu with rcu lock (fate#316335).\n- md: ensure md devices are freed before module is unloaded (bsc#1022304).\n- md: fix refcount problem on mddev when stopping array (bsc#1022304).\n- md: handle read-only member devices better (bsc#1033281).\n- md linear: fix a race between linear_add() and linear_congested() (bsc#1018446).\n- md: MD_CLOSING needs to be cleared after called md_set_readonly or do_md_stop (bsc#1038142).\n- md/raid1: add rcu protection to rdev in fix_read_error (References: bsc#998106,bsc#1020048,bsc#982783).\n- md/raid1: avoid reusing a resync bio after error handling (Fate#311379).\n- md/raid1: fix a use-after-free bug (bsc#998106,bsc#1020048,bsc#982783).\n- md/raid1: handle flush request correctly (bsc#998106,bsc#1020048,bsc#982783).\n- md/raid1: Refactor raid1_make_request (bsc#998106,bsc#1020048,bsc#982783).\n- md: support disabling of create-on-open semantics (bsc#1032339).\n- media: am437x-vpfe: fix an uninitialized variable bug (bsc#1031717).\n- media: b2c2: use IS_REACHABLE() instead of open-coding it (bsc#1031717).\n- media: c8sectpfe: Rework firmware loading mechanism (bsc#1031717).\n- media: cx231xx-audio: fix NULL-deref at probe (bsc#1031717).\n- media: cx231xx-cards: fix NULL-deref at probe (bsc#1031717).\n- media: cx23885: uninitialized variable in cx23885_av_work_handler() (bsc#1031717).\n- media: DaVinci-VPBE: Check return value of a setup_if_config() call in vpbe_set_output() (bsc#1031717).\n- media: DaVinci-VPFE-Capture: fix error handling (bsc#1031717).\n- media: dib0700: fix NULL-deref at probe (bsc#1031717).\n- media: dvb-usb: avoid link error with dib3000m{b,c| (bsc#1031717).\n- media: exynos4-is: fix a format string bug (bsc#1031717).\n- media: gspca: konica: add missing endpoint sanity check (bsc#1031717).\n- media: lirc_imon: do not leave imon_probe() with mutex held (bsc#1031717).\n- media: pvrusb2: reduce stack usage pvr2_eeprom_analyze() (bsc#1031717).\n- media: rc: allow rc modules to be loaded if rc-main is not a module (bsc#1031717).\n- media: s5p-mfc: Fix unbalanced call to clock management (bsc#1031717).\n- media: sh-vou: clarify videobuf2 dependency (bsc#1031717).\n- media: staging: media: davinci_vpfe: unlock on error in vpfe_reqbufs() (bsc#1031717).\n- media: usbvision: fix NULL-deref at probe (bsc#1031717).\n- media: uvcvideo: Fix empty packet statistic (bsc#1031717).\n- media: uvcvideo: uvc_scan_fallback() for webcams with broken chain (bsc#1021474).\n- media: vb2: Fix an off by one error in \u0027vb2_plane_vaddr\u0027 (bsc#1043231).\n- mem-hotplug: fix node spanned pages when we have a movable node (bnc#1034671).\n- mips: R2-on-R6 MULTU/MADDU/MSUBU emulation bugfix (4.4.68 stable queue).\n- mlx4: Fix memory leak after mlx4_en_update_priv() (bsc#966170 bsc#966172 bsc#966191).\n- mmc: debugfs: correct wrong voltage value (bsc#1031717).\n- mmc: Downgrade error level (bsc#1042536).\n- mm,compaction: serialize waitqueue_active() checks (bsc#971975).\n- mmc: sdhci-of-arasan: Remove no-hispd and no-cmd23 quirks for sdhci-arasan4.9a (bsc#1019351).\n- mmc: sdhci-pxav3: fix higher speed mode capabilities (bsc#1031717).\n- mmc: sdhci: restore behavior when setting VDD via external regulator (bsc#1031717).\n- mm: fix \u003clinux/pagemap.h\u003e stray kernel-doc notation (bnc#971975 VM -- git fixes).\n- mm: fix set pageblock migratetype in deferred struct page init (bnc#1027195).\n- mm/huge_memory.c: respect FOLL_FORCE/FOLL_COW for thp (bnc#1030118).\n- mm/hugetlb: check for reserved hugepages during memory offline (bnc#971975 VM -- git fixes).\n- mm/hugetlb: fix incorrect hugepages count during mem hotplug (bnc#971975 VM -- git fixes).\n- mm/memblock.c: fix memblock_next_valid_pfn() (bnc#1031200).\n- mm, memcg: do not retry precharge charges (bnc#1022559).\n- mm, page_alloc: fix check for NULL preferred_zone (bnc#971975 VM performance -- page allocator).\n- mm, page_alloc: fix fast-path race with cpuset update or removal (bnc#971975 VM performance -- page allocator).\n- mm, page_alloc: fix premature OOM when racing with cpuset mems update (bnc#971975 VM performance -- page allocator).\n- mm, page_alloc: keep pcp count and list contents in sync if struct page is corrupted (bnc#971975 VM performance -- page allocator).\n- mm, page_alloc: move cpuset seqcount checking to slowpath (bnc#971975 VM performance -- page allocator).\n- mm/page_alloc: Remove useless parameter of __free_pages_boot_core (bnc#1027195).\n- mm: page_alloc: skip over regions of invalid pfns where possible (bnc#1031200).\n- module: fix memory leak on early load_module() failures (bsc#1043014).\n- module: move add_taint_module() to a header file (fate#313296).\n- mountproto.patch: Add commit id\n- mwifiex: add missing check for PCIe8997 chipset (bsc#1018813).\n- mwifiex: Avoid skipping WEP key deletion for AP (4.4.68 stable queue).\n- mwifiex: debugfs: Fix (sometimes) off-by-1 SSID print (4.4.68 stable queue).\n- mwifiex: fix IBSS data path issue (bsc#1018813).\n- mwifiex: fix PCIe register information for 8997 chipset (bsc#1018813).\n- mwifiex: pcie: fix cmd_buf use-after-free in remove/reset (bsc#1031717).\n- mwifiex: Removed unused \u0027pkt_type\u0027 variable (bsc#1031717).\n- mwifiex: remove redundant dma padding in AMSDU (4.4.68 stable queue).\n- mwifiex: Remove unused \u0027bcd_usb\u0027 variable (bsc#1031717).\n- mwifiex: Remove unused \u0027chan_num\u0027 variable (bsc#1031717).\n- mwifiex: Remove unused \u0027pm_flag\u0027 variable (bsc#1031717).\n- mwifiex: Remove unused \u0027sta_ptr\u0027 variable (bsc#1031717).\n- net/af_iucv: do not use paged skbs for TX on HiperSockets (bnc#1020945, LTC#150566).\n- net: bridge: start hello timer only if device is up (bnc#1012382).\n- net/ena: change condition for host attribute configuration (bsc#1026509).\n- net/ena: change driver\u0027s default timeouts (bsc#1026509).\n- net: ena: change the return type of ena_set_push_mode() to be void (bsc#1026509).\n- net: ena: Fix error return code in ena_device_init() (bsc#1026509).\n- net/ena: fix ethtool RSS flow configuration (bsc#1026509).\n- net/ena: fix NULL dereference when removing the driver after device reset failed (bsc#1026509).\n- net/ena: fix potential access to freed memory during device reset (bsc#1026509).\n- net/ena: fix queues number calculation (bsc#1026509).\n- net/ena: fix RSS default hash configuration (bsc#1026509).\n- net/ena: reduce the severity of ena printouts (bsc#1026509).\n- net/ena: refactor ena_get_stats64 to be atomic context safe (bsc#1026509).\n- net/ena: remove ntuple filter support from device feature list (bsc#1026509).\n- net: ena: remove superfluous check in ena_remove() (bsc#1026509).\n- net: ena: Remove unnecessary pci_set_drvdata() (bsc#1026509).\n- net/ena: update driver version to 1.1.2 (bsc#1026509).\n- net/ena: use READ_ONCE to access completion descriptors (bsc#1026509).\n- net: ena: use setup_timer() and mod_timer() (bsc#1026509).\n- net: ethernet: apm: xgene: use phydev from struct net_device (bsc#1019351).\n- net: ethtool: Initialize buffer when querying device channel settings (bsc#969479 FATE#320634).\n- netfilter: allow logging from non-init namespaces (bsc#970083).\n- netfilter: nf_conntrack_sip: extend request line validation (bsc#1042286).\n- netfilter: nf_ct_expect: remove the redundant slash when policy name is empty (bsc#1042286).\n- netfilter: nf_dup_ipv6: set again FLOWI_FLAG_KNOWN_NH at flowi6_flags (bsc#1042286).\n- netfilter: nf_nat_snmp: Fix panic when snmp_trap_helper fails to register (bsc#1042286).\n- netfilter: nfnetlink_queue: reject verdict request from different portid (bsc#1042286).\n- netfilter: restart search if moved to other chain (bsc#1042286).\n- netfilter: use fwmark_reflect in nf_send_reset (bsc#1042286).\n- net: fix compile error in skb_orphan_partial() (bnc#1012382).\n- net: ibmvnic: Remove unused net_stats member from struct ibmvnic_adapter (fate#322021, bsc#1031512).\n- net: icmp_route_lookup should use rt dev to determine L3 domain (bsc#1042286).\n- net: implement netif_cond_dbg macro (bsc#1019168).\n- net: ipv6: Fix processing of RAs in presence of VRF (bsc#1042286).\n- net: ipv6: set route type for anycast routes (bsc#1042286).\n- net: l3mdev: Add master device lookup by index (bsc#1042286).\n- net: make netdev_for_each_lower_dev safe for device removal (bsc#1042286).\n- net/mlx4_core: Avoid command timeouts during VF driver device shutdown (bsc#1028017).\n- net/mlx4_core: Avoid delays during VF driver device shutdown (bsc#1028017).\n- net/mlx4_core: Fix racy CQ (Completion Queue) free (bsc#1028017).\n- net/mlx4_core: Fix when to save some qp context flags for dynamic VST to VGT transitions (bsc#1028017).\n- net/mlx4_core: Use cq quota in SRIOV when creating completion EQs (bsc#1028017).\n- net/mlx4_en: Fix bad WQE issue (bsc#1028017).\n- net/mlx5: Do not unlock fte while still using it (bsc#966170 bsc#966172 bsc#966191).\n- net/mlx5e: Modify TIRs hash only when it\u0027s needed (bsc#966170 bsc#966172 bsc#966191).\n- net/mlx5: Fix create autogroup prev initializer (bsc#966170 bsc#966172 bsc#966191).\n- net/mlx5: Prevent setting multicast macs for VFs (bsc#966170 bsc#966172 bsc#966191).\n- net/mlx5: Release FTE lock in error flow (bsc#966170 bsc#966172 bsc#966191).\n- net: remove useless memset\u0027s in drivers get_stats64 (bsc#1019351).\n- net: vrf: Create FIB tables on link create (bsc#1042286).\n- net: vrf: Fix crash when IPv6 is disabled at boot time (bsc#1042286).\n- net: vrf: Fix dev refcnt leak due to IPv6 prefix route (bsc#1042286).\n- net: vrf: Fix dst reference counting (bsc#1042286).\n- net: vrf: protect changes to private data with rcu (bsc#1042286).\n- net: vrf: Switch dst dev to loopback on device delete (bsc#1042286).\n- netvsc: add rcu_read locking to netvsc callback (fate#320485).\n- netxen_nic: set rcode to the return status from the call to netxen_issue_cmd (bsc#966339 FATE#320150).\n- net: xgene: avoid bogus maybe-uninitialized warning (bsc#1019351).\n- net: xgene: fix backward compatibility fix (bsc#1019351).\n- net/xgene: fix error handling during reset (bsc#1019351).\n- net: xgene: move xgene_cle_ptree_ewdn data off stack (bsc#1019351).\n- nfit: fail DSMs that return non-zero status by default (bsc#1023175).\n- nfsd4: minor NFSv2/v3 write decoding cleanup (bsc#1034670).\n- nfsd: check for oversized NFSv2/v3 arguments (bsc#1034670).\n- nfs: do not try to cross a mountpount when there isn\u0027t one there (bsc#1028041).\n- nfsd: stricter decoding of write-like NFSv2/v3 ops (bsc#1034670).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (git-fixes).\n- nfs: Fix \u0027Do not increment lock sequence ID after NFS4ERR_MOVED\u0027 (git-fixes).\n- nfs: Fix inode corruption in nfs_prime_dcache() (git-fixes).\n- nfs: Fix missing pg_cleanup after nfs_pageio_cond_complete() (git-fixes).\n- nfs: Fix NFS4 nfs4_do_reclaim() might_sleep()/scheduling while atomic splats. Bug exists in all RT trees \u0026gt;= v3.16, was spotted/fixed in v4.8-rt, but with no stable-rt backport. Pick it up.\n- nfs: flush out dirty data on file fput() (bsc#1021762).\n- nfs: Use GFP_NOIO for two allocations in writeback (git-fixes).\n- nfsv4.1: Fix Oopsable condition in server callback races (git-fixes).\n- nfsv4: fix a reference leak caused WARNING messages (git-fixes).\n- nfsv4: Fix the underestimation of delegation XDR space reservation (git-fixes).\n- nsfs: mark dentry with DCACHE_RCUACCESS (bsc#1012829).\n- nvdimm: kabi protect nd_cmd_out_size() (bsc#1023175).\n- nvme: apply DELAY_BEFORE_CHK_RDY quirk at probe time too (bsc#1020685).\n- nvme: Delete created IO queues on reset (bsc#1031717).\n- nvme: Do not suspend admin queue that wasn\u0027t created (bsc#1026505).\n- nvme: submit nvme_admin_activate_fw to admin queue (bsc#1044532).\n- nvme: Suspend all queues before deletion (bsc#1026505).\n- ocfs2/dlmglue: prepare tracking logic to avoid recursive cluster lock (bsc#1004003).\n- ocfs2: fix deadlock issue when taking inode lock at vfs entry points (bsc#1004003).\n- overlayfs: compat, fix incorrect dentry use in ovl_rename2 (bsc#1032400).\n- overlayfs: compat, use correct dentry to detect compat mode in ovl_compat_is_whiteout (bsc#1032400).\n- pci: Add devm_request_pci_bus_resources() (bsc#1019351).\n- pci/AER: include header file (bsc#964944,FATE#319965).\n- pci: generic: Fix pci_remap_iospace() failure path (bsc#1019630).\n- pci: hv: Fix wslot_to_devfn() to fix warnings on device removal (fate#320485, bug#1028217).\n- pci: hv: Use device serial number as PCI domain (fate#320485, bug#1028217).\n- pci: pciehp: Prioritize data-link event over presence detect (bsc#1031040,bsc#1037483).\n- pci: Reverse standard ACS vs device-specific ACS enabling (bsc#1030057).\n- pci: Work around Intel Sunrise Point PCH incorrect ACS capability (bsc#1030057).\n- pci: xgene: Add local struct device pointers (bsc#1019351).\n- pci: xgene: Add register accessors (bsc#1019351).\n- pci: xgene: Free bridge resource list on failure (bsc#1019351).\n- pci: xgene: Make explicitly non-modular (bsc#1019351).\n- pci: xgene: Pass struct xgene_pcie_port to setup functions (bsc#1019351).\n- pci: xgene: Remove unused platform data (bsc#1019351).\n- pci: xgene: Request host bridge window resources (bsc#1019351).\n- percpu: remove unused chunk_alloc parameter from pcpu_get_pages() (bnc#971975 VM -- git fixes).\n- perf/x86/intel/rapl: Make Knights Landings support functional (bsc#1042517).\n- perf/x86/intel/uncore: Remove SBOX support for Broadwell server (bsc#1035887).\n- perf: xgene: Remove bogus IS_ERR() check (bsc#1019351).\n- phy: qcom-usb-hs: Add depends on EXTCON (4.4.68 stable queue).\n- phy: xgene: rename \u0027enum phy_mode\u0027 to \u0027enum xgene_phy_mode\u0027 (bsc#1019351).\n- pid_ns: Sleep in TASK_INTERRUPTIBLE in zap_pid_ns_processes (bnc#1012985).\n- ping: implement proper locking (bsc#1031003).\n- pkcs#7: fix missing break on OID_sha224 case (bsc#1031717).\n- platform/x86: fujitsu-laptop: use brightness_set_blocking for LED-setting callbacks (bsc#1031717).\n- pm / QoS: Fix memory leak on resume_latency.notifiers (bsc#1043231).\n- pm / wakeirq: Enable dedicated wakeirq for suspend (bsc#1031717).\n- pm / wakeirq: Fix spurious wake-up events for dedicated wakeirqs (bsc#1031717).\n- pm / wakeirq: report a wakeup_event on dedicated wekup irq (bsc#1031717).\n- power: bq27xxx: fix register numbers of bq27500 (bsc#1031717).\n- powerpc/64: Fix flush_(d|i)cache_range() called from modules (bnc#863764 fate#315275, LTC#103998).\n- powerpc: Blacklist GCC 5.4 6.1 and 6.2 (boo#1028895).\n- powerpc: Create a helper for getting the kernel toc value (FATE#322421).\n- powerpc/fadump: Fix the race in crash_fadump() (bsc#1022971).\n- powerpc/fadump: Reserve memory at an offset closer to bottom of RAM (bsc#1032141).\n- powerpc/fadump: Update fadump documentation (bsc#1032141).\n- powerpc/ftrace: Add Kconfig \u0026 Make glue for mprofile-kernel (FATE#322421).\n- powerpc/ftrace: Add support for -mprofile-kernel ftrace ABI (FATE#322421).\n- powerpc/ftrace: Use $(CC_FLAGS_FTRACE) when disabling ftrace (FATE#322421).\n- powerpc/ftrace: Use generic ftrace_modify_all_code() (FATE#322421).\n- powerpc: introduce TIF_KGR_IN_PROGRESS thread flag (FATE#322421).\n- powerpc/livepatch: Add livepatch header (FATE#322421).\n- powerpc/livepatch: Add live patching support on ppc64le (FATE#322421).\n- powerpc/livepatch: Add livepatch stack to struct thread_info (FATE#322421).\n- powerpc/module: Create a special stub for ftrace_caller() (FATE#322421).\n- powerpc/module: Mark module stubs with a magic value (FATE#322421).\n- powerpc/module: Only try to generate the ftrace_caller() stub once (FATE#322421).\n- powerpc/modules: Never restore r2 for a mprofile-kernel style mcount() call (FATE#322421).\n- powerpc/powernv: Fix opal_exit tracepoint opcode (4.4.68 stable queue).\n- power: reset: xgene-reboot: Unmap region obtained by of_iomap (bsc#1019351).\n- power: supply: bq24190_charger: Call power_supply_changed() for relevant component (4.4.68 stable queue).\n- power: supply: bq24190_charger: Call set_mode_host() on pm_resume() (4.4.68 stable queue).\n- power: supply: bq24190_charger: Do not read fault register outside irq_handle_thread() (4.4.68 stable queue).\n- power: supply: bq24190_charger: Fix irq trigger to IRQF_TRIGGER_FALLING (4.4.68 stable queue).\n- power: supply: bq24190_charger: Handle fault before status on interrupt (4.4.68 stable queue).\n- power: supply: bq24190_charger: Install irq_handler_thread() at end of probe() (4.4.68 stable queue).\n- printk: Switch to the sync mode when an emergency message is printed (bsc#1034995).\n- qeth: check not more than 16 SBALEs on the completion queue (bnc#1009718, LTC#148203).\n- quota: fill in Q_XGETQSTAT inode information for inactive quotas (bsc#1042356).\n- radix-tree: fix radix_tree_iter_retry() for tagged iterators (bsc#1012829).\n- raid1: a new I/O barrier implementation to remove resync window (bsc#998106,bsc#1020048,bsc#982783).\n- raid1: avoid unnecessary spin locks in I/O barrier code (bsc#998106,bsc#1020048,bsc#982783).\n- raid1: ignore discard error (bsc#1017164).\n- ravb: Fix use-after-free on `ifconfig eth0 down` (git-fixes).\n- rdma/iw_cxgb4: Add missing error codes for act open cmd (bsc#1026570).\n- rdma/iw_cxgb4: Low resource fixes for Completion queue (bsc#1026570).\n- rdma/iw_cxgb4: only read markers_enabled mod param once (bsc#1026570).\n- Refresh patches.suse/blk-timeout-no-round. Refresh patches.drivers/0041-block-add-ability-to-flag-write-back-caching-on-a-device.patch Do not collide with QUEUE_FLAG_WC from upstream (bsc#1022547)\n- regulator: isl9305: fix array size (bsc#1031717).\n- reiserfs: fix race in prealloc discard (bsc#987576).\n- Revert \u0027acpi, nfit, libnvdimm: fix interleave set cookie calculation (64-bit comparison)\u0027 (kabi).\n- Revert \u0027btrfs: qgroup: Move half of the qgroup accounting time out of\u0027 (bsc#1017461 bsc#1033885).\n- Revert \u0027btrfs: qgroup: Move half of the qgroup accounting time out of\u0027 This reverts commit f69c1d0f6254c73529a48fd2f87815d047ad7288.\n- Revert \u0027give up on gcc ilog2() constant optimizations\u0027 (kabi).\n- Revert \u0027KVM: nested VMX: disable perf cpuid reporting\u0027 (4.4.68 stable queue).\n- Revert \u0027l2tp: take reference on sessions being dumped\u0027 (kabi).\n- Revert \u0027mac80211: pass block ack session timeout to to driver\u0027 (kabi).\n- Revert \u0027mac80211: RX BA support for sta max_rx_aggregation_subframes\u0027 (kabi).\n- Revert \u0027net: introduce device min_header_len\u0027 (kabi).\n- Revert \u0027net/mlx4_en: Avoid unregister_netdev at shutdown flow\u0027 (bsc#1028017).\n- Revert \u0027nfit, libnvdimm: fix interleave set cookie calculation\u0027 (kabi).\n- Revert \u0027RDMA/core: Fix incorrect structure packing for booleans\u0027 (kabi).\n- Revert \u0027target: Fix NULL dereference during LUN lookup + active I/O shutdown\u0027 (kabi).\n- Revert \u0027wlcore: Add RX_BA_WIN_SIZE_CHANGE_EVENT event\u0027 (kabi).\n- rpm/kernel-binary.spec.in: Fix installation of /etc/uefi/certs (bsc#1019594)\n- rpm/kernel-binary.spec: remove superfluous flags This should make build logs more readable and people adding more flags should have easier time finding a place to add them in the spec file.\n- rpm/kernel-spec-macros: Fix the check if there is no rebuild counter (bsc#1012060)\n- rpm/SLES-UEFI-SIGN-Certificate-2048.crt: Update the certificate (bsc#1035922)\n- rtc: cmos: avoid unused function warning (bsc#1022429).\n- rtc: cmos: Clear ACPI-driven alarms upon resume (bsc#1022429).\n- rtc: cmos: Do not enable interrupts in the middle of the interrupt handler (bsc#1022429).\n- rtc: cmos: Restore alarm after resume (bsc#1022429).\n- rtlwifi: rtl_usb: Fix missing entry in USB driver\u0027s private data (bsc#1026462).\n- rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string (4.4.68 stable queue).\n- rtnl: reset calcit fptr in rtnl_unregister() (bsc#1042286).\n- s390/cpuinfo: show maximum thread id (bnc#1009718, LTC#148580).\n- s390/dasd: check if query host access feature is supported (bsc#1037871).\n- s390/kmsg: add missing kmsg descriptions (bnc#1025683, LTC#151573).\n- s390/mm: fix zone calculation in arch_add_memory() (bnc#1025683, LTC#152318).\n- s390/sysinfo: show partition extended name and UUID if available (bnc#1009718, LTC#150160).\n- s390/time: LPAR offset handling (bnc#1009718, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1009718, LTC#146920).\n- sbp-target: Fix second argument of percpu_ida_alloc() (bsc#1032803).\n- sched: Allow hotplug notifiers to be setup early (bnc#1022476).\n- sched/core: Fix incorrect utilization accounting when switching to fair class (bnc#1022476).\n- sched/core: Fix set_user_nice() (bnc#1022476).\n- sched/core, x86/topology: Fix NUMA in package topology bug (bnc#1022476).\n- sched/cputime: Add steal time support to full dynticks CPU time accounting (bnc#1022476).\n- sched/cputime: Fix prev steal time accouting during CPU hotplug (bnc#1022476).\n- sched/deadline: Always calculate end of period on sched_yield() (bnc#1022476).\n- sched/deadline: Fix a bug in dl_overflow() (bnc#1022476).\n- sched/deadline: Fix lock pinning warning during CPU hotplug (bnc#1022476).\n- sched/deadline: Fix wrap-around in DL heap (bnc#1022476).\n- sched/fair: Avoid using decay_load_missed() with a negative value (bnc#1022476).\n- sched/fair: Fix fixed point arithmetic width for shares and effective load (bnc#1022476).\n- sched/fair: Fix load_above_capacity fixed point arithmetic width (bnc#1022476).\n- sched/fair: Fix min_vruntime tracking (bnc#1022476).\n- sched/fair: Fix the wrong throttled clock time for cfs_rq_clock_task() (bnc#1022476).\n- sched/fair: Improve PELT stuff some more (bnc#1022476).\n- sched/loadavg: Avoid loadavg spikes caused by delayed NO_HZ accounting (bsc#1018419).\n- sched: Make wake_up_nohz_cpu() handle CPUs going offline (bnc#1022476).\n- sched/rt: Fix PI handling vs. sched_setscheduler() (bnc#1022476).\n- sched/rt: Kick RT bandwidth timer immediately on start up (bnc#1022476).\n- sched/rt, sched/dl: Do not push if task\u0027s scheduling class was changed (bnc#1022476).\n- scsi: be2iscsi: Add FUNCTION_RESET during driver unload (bsc#1038458).\n- scsi: be2iscsi: Add IOCTL to check UER supported (bsc#1038458).\n- scsi: be2iscsi: Add TPE recovery feature (bsc#1038458).\n- scsi: be2iscsi: Add V1 of EPFW cleanup IOCTL (bsc#1038458).\n- scsi: be2iscsi: allocate enough memory in beiscsi_boot_get_sinfo() (bsc#1038458).\n- scsi: be2iscsi: Check all zeroes IP before issuing IOCTL (bsc#1038458).\n- scsi: be2iscsi: Fail the sessions immediately after TPE (bsc#1038458).\n- scsi: be2iscsi: Fix async PDU handling path (bsc#1038458).\n- scsi: be2iscsi: Fix bad WRB index error (bsc#1038458).\n- scsi: be2iscsi: Fix checks for HBA in error state (bsc#1038458).\n- scsi: be2iscsi: Fix gateway APIs to support IPv4 \u0026 IPv6 (bsc#1038458).\n- scsi: be2iscsi: Fix POST check and reset sequence (bsc#1038458).\n- scsi: be2iscsi: Fix queue and connection parameters (bsc#1038458).\n- scsi: be2iscsi: Fix release of DHCP IP in static mode (bsc#1038458).\n- scsi: be2iscsi: Fix to add timer for UE detection (bsc#1038458).\n- scsi: be2iscsi: Fix to make boot discovery non-blocking (bsc#1038458).\n- scsi: be2iscsi: Fix to use correct configuration values (bsc#1038458).\n- scsi: be2iscsi: Handle only NET_PARAM in iface_get_param (bsc#1038458).\n- scsi: be2iscsi: Move functions to right files (bsc#1038458).\n- scsi: be2iscsi: Move VLAN code to common iface_set_param (bsc#1038458).\n- scsi: be2iscsi: Reduce driver load/unload time (bsc#1038458).\n- scsi: be2iscsi: Remove alloc_mcc_tag \u0026 beiscsi_pci_soft_reset (bsc#1038458).\n- scsi: be2iscsi: Remove isr_lock and dead code (bsc#1038458).\n- scsi: be2iscsi: Rename iface get/set/create/destroy APIs (bsc#1038458).\n- scsi: be2iscsi: Replace _bh version for mcc_lock spinlock (bsc#1038458).\n- scsi: be2iscsi: Set and return right iface v4/v6 states (bsc#1038458).\n- scsi: be2iscsi: Update copyright information (bsc#1038458).\n- scsi: be2iscsi: Update iface handle before any set param (bsc#1038458).\n- scsi: be2iscsi: Update the driver version (bsc#1038458).\n- scsi: cxgb4i: libcxgbi: add missing module_put() (bsc#1018885).\n- scsi: cxgb4i: libcxgbi: cxgb4: add T6 iSCSI completion feature (bsc#1021424).\n- scsi: cxlflash: Remove the device cleanly in the system shutdown path (bsc#1028310, fate#321597, bsc#1034762). cherry-pick from SP3\n- scsi_dh_alua: do not call BUG_ON when updating port group (bsc#1028340).\n- scsi_dh_alua: Do not modify the interval value for retries (bsc#1012910).\n- scsi_dh_alua: Do not retry for unmapped device (bsc#1012910).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#1027054).\n- scsi_error: count medium access timeout only once per EH run (bsc#993832, bsc#1032345).\n- scsi: fnic: Correcting rport check location in fnic_queuecommand_lck (bsc#1035920).\n- scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION (bsc#1034419).\n- scsi: ipr: Driver version 2.6.4 (bsc#1031555, fate#321595).\n- scsi: ipr: Error path locking fixes (bsc#1031555, fate#321595).\n- scsi: ipr: Fix abort path race condition (bsc#1031555, fate#321595).\n- scsi: ipr: Fix missed EH wakeup (bsc#1031555, fate#321595).\n- scsi: ipr: Fix SATA EH hang (bsc#1031555, fate#321595).\n- scsi: ipr: Remove redundant initialization (bsc#1031555, fate#321595).\n- scsi: mac_scsi: Fix MAC_SCSI=m option when SCSI=m (4.4.68 stable queue).\n- scsi: scsi_dh_alua: Check scsi_device_get() return value (bsc#1040125).\n- scsi: scsi_dh_emc: return success in clariion_std_inquiry() (4.4.68 stable queue).\n- scsi_transport_fc: do not call queue_work under lock (bsc#1013887).\n- scsi_transport_fc: fixup race condition in fc_rport_final_delete() (bsc#1013887).\n- scsi_transport_fc: return -EBUSY for deleted vport (bsc#1013887).\n- sctp: check af before verify address in sctp_addr_id2transport (git-fixes).\n- sd: always scan VPD pages if thin provisioning is enabled (bsc#1013792).\n- serial: 8250_omap: Fix probe and remove for PM runtime (4.4.68 stable queue).\n- series.conf cosmetic adjustment (missing rt version placeholders)\n- series.conf: remove silly comment\n- ses: Fix SAS device detection in enclosure (bsc#1016403).\n- sfc: reduce severity of PIO buffer alloc failures (bsc#1019168).\n- sfc: refactor debug-or-warnings printks (bsc#1019168).\n- softirq: Let ksoftirqd do its job (bsc#1019618).\n- staging: emxx_udc: remove incorrect __init annotations (4.4.68 stable queue).\n- staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data() (bsc#1031717).\n- staging: wlan-ng: add missing byte order conversion (4.4.68 stable queue).\n- sunrpc: Allow xprt-\u003eops-\u003etimer method to sleep (git-fixes).\n- sunrpc: ensure correct error is reported by xs_tcp_setup_socket() (git-fixes).\n- sunrpc: fix UDP memory accounting (git-fixes).\n- sunrpc: Silence WARN_ON when NFSv4.1 over RDMA is in use (git-fixes).\n- supported.conf: added drivers/net/ethernet/chelsio/libcxgb/libcxgb\n- supported.conf: Add tcp_westwood as supported module (fate#322432)\n- supported.conf: Bugzilla and FATE references for dcdbas and dell_rbu\n- sysfs: be careful of error returns from ops-\u003eshow() (bsc#1028883).\n- taint/module: Clean up global and module taint flags handling (fate#313296).\n- target: add XCOPY target/segment desc sense codes (bsc#991273).\n- target: bounds check XCOPY segment descriptor list (bsc#991273).\n- target: bounds check XCOPY total descriptor list length (bsc#991273).\n- target: check for XCOPY parameter truncation (bsc#991273).\n- target: check XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: return UNSUPPORTED TARGET/SEGMENT DESC TYPE CODE sense (bsc#991273).\n- target: simplify XCOPY wwn-\u003ese_dev lookup helper (bsc#991273).\n- target: support XCOPY requests without parameters (bsc#991273).\n- target: use XCOPY segment descriptor CSCD IDs (bsc#1017170).\n- target: use XCOPY TOO MANY TARGET DESCRIPTORS sense (bsc#991273).\n- tcp: account for ts offset only if tsecr not zero (bsc#1042286).\n- tcp: do not inherit fastopen_req from parent (4.4.68 stable queue).\n- tcp: do not underestimate skb-\u003etruesize in tcp_trim_head() (4.4.68 stable queue).\n- tcp: fastopen: accept data/FIN present in SYNACK message (bsc#1042286).\n- tcp: fastopen: avoid negative sk_forward_alloc (bsc#1042286).\n- tcp: fastopen: call tcp_fin() if FIN present in SYNACK (bsc#1042286).\n- tcp: fastopen: fix rcv_wup initialization for TFO server on SYN/data (bsc#1042286).\n- tcp: fix wraparound issue in tcp_lp (4.4.68 stable queue).\n- thp: fix MADV_DONTNEED vs. numa balancing race (bnc#1027974).\n- thp: reduce indentation level in change_huge_pmd() (bnc#1027974).\n- tpm: Downgrade error level (bsc#1042535).\n- tpm: fix checks for policy digest existence in tpm2_seal_trusted() (bsc#1034048, Pending fixes 2017-04-10).\n- tpm: fix RC value check in tpm2_seal_trusted (bsc#1034048, Pending fixes 2017-04-10).\n- tpm: fix: set continueSession attribute for the unseal operation (bsc#1034048, Pending fixes 2017-04-10).\n- tracing/kprobes: Enforce kprobes teardown after testing (bnc#1012985).\n- udp: avoid ufo handling on IP payload compression packets (bsc#1042286).\n- udplite: call proper backlog handlers (bsc#1042286).\n- Update mainline reference in patches.drivers/drm-ast-Fix-memleaks-in-error-path-in-ast_fb_create.patch See (bsc#1028158) for the context in which this was discovered upstream.\n- Update metadata for serial fixes (bsc#1013001)\n- Update patches.fixes/xen-silence-efi-error-messge.patch (bnc#1039900).\n- Update patches.kernel.org/patch-4.4.47-48 (bnc#1012382 bnc#1022181). Add a bnc reference.\n- usb: chipidea: Handle extcon events properly (4.4.68 stable queue).\n- usb: chipidea: Only read/write OTGSC from one place (4.4.68 stable queue).\n- usb: host: ehci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).\n- usb: host: ohci-exynos: Decrese node refcount on exynos_ehci_get_phy() error paths (4.4.68 stable queue).\n- usb: musb: ux500: Fix NULL pointer dereference at system PM (bsc#1038033).\n- usb: serial: ark3116: fix open error handling (bnc#1038043).\n- usb: serial: ch341: add register and USB request definitions (bnc#1038043).\n- usb: serial: ch341: add support for parity, frame length, stop bits (bnc#1038043).\n- usb: serial: ch341: fix baud rate and line-control handling (bnc#1038043).\n- usb: serial: ch341: fix line settings after reset-resume (bnc#1038043).\n- usb: serial: ch341: fix modem-status handling (bnc#1038043).\n- usb: serial: ch341: reinitialize chip on reconfiguration (bnc#1038043).\n- usb: serial: digi_acceleport: fix incomplete rx sanity check (4.4.68 stable queue).\n- usb: serial: fix compare_const_fl.cocci warnings (bnc#1038043).\n- usb: serial: ftdi_sio: fix latency-timer error handling (4.4.68 stable queue).\n- usb: serial: io_edgeport: fix descriptor error handling (4.4.68 stable queue).\n- usb: serial: io_edgeport: fix epic-descriptor handling (bnc#1038043).\n- usb: serial: keyspan_pda: fix receive sanity checks (4.4.68 stable queue).\n- usb: serial: mct_u232: fix modem-status error handling (4.4.68 stable queue).\n- usb: serial: quatech2: fix control-message error handling (bnc#1038043).\n- usb: serial: sierra: fix bogus alternate-setting assumption (bnc#1038043).\n- usb: serial: ssu100: fix control-message error handling (bnc#1038043).\n- usb: serial: ti_usb_3410_5052: fix control-message error handling (4.4.68 stable queue).\n- Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available.\n- Use up spare in struct module for livepatch (FATE#322421).\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- vrf: remove slave queue and private slave struct (bsc#1042286).\n- vsock: Detach QP check should filter out non matching QPs (bsc#1036752).\n- x86/apic/uv: Silence a shift wrapping warning (bsc#1023866).\n- x86/CPU/AMD: Fix Zen SMT topology (bsc#1027512).\n- x86/ioapic: Change prototype of acpi_ioapic_add() (bsc#1027153, bsc#1027616).\n- x86/ioapic: Fix incorrect pointers in ioapic_setup_resources() (bsc#1027153, bsc#1027616).\n- x86/ioapic: Fix IOAPIC failing to request resource (bsc#1027153, bsc#1027616).\n- x86/ioapic: fix kABI (hide added include) (bsc#1027153, bsc#1027616).\n- x86/ioapic: Fix lost IOAPIC resource after hot-removal and hotadd (bsc#1027153, bsc#1027616).\n- x86/ioapic: Fix setup_res() failing to get resource (bsc#1027153, bsc#1027616).\n- x86/ioapic: Ignore root bridges without a companion ACPI device (bsc#1027153, bsc#1027616).\n- x86/ioapic: Restore IO-APIC irq_chip retrigger callback (4.4.68 stable queue).\n- x86/ioapic: Simplify ioapic_setup_resources() (bsc#1027153, bsc#1027616).\n- x86/ioapic: Support hot-removal of IOAPICs present during boot (bsc#1027153, bsc#1027616).\n- x86/mce: Do not print MCEs when mcelog is active (bsc#1013994).\n- x86/MCE: Dump MCE to dmesg if no consumers (bsc#1013994).\n- x86/mce: Fix copy/paste error in exception table entries (fate#319858).\n- x86, mm: fix gup_pte_range() vs DAX mappings (bsc#1026405).\n- x86/mm/gup: Simplify get_user_pages() PTE bit handling (bsc#1026405).\n- x86/pci-calgary: Fix iommu_free() comparison of unsigned expression \u003e= 0 (4.4.68 stable queue).\n- x86/PCI: Mark Broadwell-EP Home Agent 1 as having non-compliant BARs (bsc#9048891).\n- x86/platform/intel/iosf_mbi: Add a mutex for P-Unit access (bsc#1011913).\n- x86/platform/intel/iosf_mbi: Add a PMIC bus access notifier (bsc#1011913).\n- x86/platform/intel-mid: Correct MSI IRQ line for watchdog device (4.4.68 stable queue).\n- x86/platform: Remove warning message for duplicate NMI handlers (bsc#1029220).\n- x86/platform/UV: Add basic CPU NMI health check (bsc#1023866).\n- x86/platform/UV: Add Support for UV4 Hubless NMIs (bsc#1023866).\n- x86/platform/UV: Add Support for UV4 Hubless systems (bsc#1023866).\n- x86/platform/uv/BAU: Add generic function pointers (bsc#1035024).\n- x86/platform/uv/BAU: Add payload descriptor qualifier (bsc#1035024).\n- x86/platform/uv/BAU: Add status mmr location fields to bau_control (bsc#1035024).\n- x86/platform/uv/BAU: Add UV4-specific functions (bsc#1035024).\n- x86/platform/uv/BAU: Add uv_bau_version enumerated constants (bsc#1035024).\n- x86/platform/uv/BAU: Add wait_completion to bau_operations (bsc#1035024).\n- x86/platform/uv/BAU: Clean up and update printks (bsc#1035024).\n- x86/platform/uv/BAU: Cleanup bau_operations declaration and instances (bsc#1035024).\n- x86/platform/uv/BAU: Clean up pq_init() (bsc#1035024).\n- x86/platform/uv/BAU: Clean up vertical alignment (bsc#1035024).\n- x86/platform/uv/BAU: Convert uv_physnodeaddr() use to uv_gpa_to_offset() (bsc#1035024).\n- x86/platform/uv/BAU: Disable software timeout on UV4 hardware (bsc#1035024).\n- x86/platform/uv/BAU: Fix HUB errors by remove initial write to sw-ack register (bsc#1035024).\n- x86/platform/uv/BAU: Fix payload queue setup on UV4 hardware (bsc#1035024).\n- x86/platform/uv/BAU: Implement uv4_wait_completion with read_status (bsc#1035024).\n- x86/platform/uv/BAU: Populate -\u003euvhub_version with UV4 version information (bsc#1035024).\n- x86/platform/uv/BAU: Use generic function pointers (bsc#1035024).\n- x86/platform/UV: Clean up the NMI code to match current coding style (bsc#1023866).\n- x86/platform/UV: Clean up the UV APIC code (bsc#1023866).\n- x86/platform/UV: Ensure uv_system_init is called when necessary (bsc#1023866).\n- x86/platform/UV: Fix 2 socket config problem (bsc#1023866).\n- x86/platform/uv: Fix calculation of Global Physical Address (bsc#1031147).\n- x86/platform/UV: Fix panic with missing UVsystab support (bsc#1023866).\n- x86/platform/UV: Initialize PCH GPP_D_0 NMI Pin to be NMI source (bsc#1023866).\n- x86/platform/UV: Verify NMI action is valid, default is standard (bsc#1023866).\n- x86/ras/therm_throt: Do not log a fake MCE for thermal events (bsc#1028027).\n- xen: add sysfs node for guest type (bnc#1037840).\n- xen: adjust early dom0 p2m handling to xen hypervisor behavior (bnc#1031470).\n- xen-blkback: do not leak stack data via response ring (bsc#1042863 XSA-216).\n- xen-blkfront: correct maximum segment accounting (bsc#1018263).\n- xen-blkfront: do not call talk_to_blkback when already connected to blkback.\n- xen/blkfront: Fix crash if backend does not follow the right states.\n- xen-blkfront: free resources if xlvbd_alloc_gendisk fails.\n- xen/mce: do not issue error message for failed /dev/mcelog registration (bnc#1036638).\n- xen/netback: set default upper limit of tx/rx queues to 8 (bnc#1019163).\n- xen/netfront: set default upper limit of tx/rx queues to 8 (bnc#1019163).\n- xen: Use machine addresses in /sys/kernel/vmcoreinfo when PV (bsc#1014136)\n- xfrm: Fix memory leak of aead algorithm name (bsc#1042286).\n- xfrm: Only add l3mdev oif to dst lookups (bsc#1042286).\n- xfs: add missing include dependencies to xfs_dir2.h (bsc#1042421).\n- xfs_dmapi: fix the debug compilation of xfs_dmapi (bsc#989056).\n- xfs: do not allow di_size with high bit set (bsc#1024234).\n- xfs: do not assert fail on non-async buffers on ioacct decrement (bsc#1041160).\n- xfs: do not take the IOLOCK exclusive for direct I/O page invalidation (bsc#1015609).\n- xfs: do not warn on buffers not being recovered due to LSN (bsc#1043598).\n- xfs: exclude never-released buffers from buftarg I/O accounting (bsc#1024508).\n- xfs: fix broken multi-fsb buffer logging (bsc#1024081).\n- xfs: fix buffer overflow dm_get_dirattrs/dm_get_dirattrs2 (bsc#989056).\n- xfs: fix eofblocks race with file extending async dio writes (bsc#1040929).\n- xfs: Fix missed holes in SEEK_HOLE implementation (bsc#1041168).\n- xfs: fix off-by-one on max nr_pages in xfs_find_get_desired_pgoff() (bsc#1041168).\n- xfs: fix up xfs_swap_extent_forks inline extent handling (bsc#1023888).\n- xfs: fix xfs_mode_to_ftype() prototype (bsc#1043598).\n- xfs: in _attrlist_by_handle, copy the cursor back to userspace (bsc#1041242).\n- xfs: log recovery tracepoints to track current lsn and buffer submission (bsc#1043598).\n- xfs: Make __xfs_xattr_put_listen preperly report errors (bsc#1041242).\n- xfs: only return -errno or success from attr -\u003eput_listent (bsc#1041242).\n- xfs: pass current lsn to log recovery buffer validation (bsc#1043598).\n- xfs: refactor log record unpack and data processing (bsc#1043598).\n- xfs: replace xfs_mode_to_ftype table with switch statement (bsc#1042421).\n- xfs: rework log recovery to submit buffers on LSN boundaries (bsc#1043598).\n- xfs: rework the inline directory verifiers (bsc#1042421).\n- xfs: sanity check directory inode di_size (bsc#1042421).\n- xfs: sanity check inode di_mode (bsc#1042421).\n- xfs: Split default quota limits by quota type (bsc#1040941).\n- xfs: track and serialize in-flight async buffers against unmount (bsc#1024508).\n- xfs: track and serialize in-flight async buffers against unmount - kABI (bsc#1024508).\n- xfs: update metadata LSN in buffers during log recovery (bsc#1043598).\n- xfs: use -\u003eb_state to fix buffer I/O accounting release race (bsc#1041160).\n- xfs: verify inline directory data forks (bsc#1042421).\n- xgene_enet: remove bogus forward declarations (bsc#1032673).\n- zswap: do not param_set_charp while holding spinlock (VM Functionality, bsc#1042886).\n- blacklist.conf: add non-applicable fixes for iwlwifi (FATE#323335)\n- blacklist.conf: blacklist c34a69059d78 (bnc#1044880)\n- btrfs: disable possible cause of premature ENOSPC (bsc#1040182)\n- btrfs: Manually implement device_total_bytes getter/setter (bsc#1043912).\n- btrfs: Round down values which are written for total_bytes_size (bsc#1043912).\n- dm: remove dummy dm_table definition (bsc#1045307)\n- Fix soft lockup in svc_rdma_send (bsc#1044854).\n- fs/exec.c: account for argv/envp pointers (bnc#1039354, CVE-2017-1000365).\n- hpsa: limit transfer length to 1MB (bsc#1025461).\n- hwpoison, memcg: forcibly uncharge LRU pages (bnc#1046105).\n- IB/ipoib: Fix memory leak in create child syscall (bsc#1022595 FATE#322350).\n- ibmvnic: Correct return code checking for ibmvnic_init during probe (bsc#1045286).\n- ibmvnic: Fix assignment of RX/TX IRQ\u0027s (bsc#1046589).\n- ibmvnic: Fix error handling when registering long-term-mapped buffers (bsc#1045568).\n- ibmvnic: Fix incorrectly defined ibmvnic_request_map_rsp structure (bsc#1045568).\n- ibmvnic: Remove module author mailing address (bsc#1045467).\n- ibmvnic: Return from ibmvnic_resume if not in VNIC_OPEN state (bsc#1045235).\n- iw_cxgb4: Fix error return code in c4iw_rdev_open() (bsc#1026570).\n- iwlwifi: 8000: fix MODULE_FIRMWARE input.\n- iwlwifi: 9000: increase the number of queues.\n- iwlwifi: add device ID for 8265.\n- iwlwifi: add device IDs for the 8265 device.\n- iwlwifi: add disable_11ac module param.\n- iwlwifi: add new 3168 series devices support.\n- iwlwifi: add new 8260 PCI IDs.\n- iwlwifi: add new 8265.\n- iwlwifi: add new 8265 series PCI ID.\n- iwlwifi: Add new PCI IDs for 9260 and 5165 series.\n- iwlwifi: Add PCI IDs for the new 3168 series.\n- iwlwifi: Add PCI IDs for the new series 8165.\n- iwlwifi: add support for 12K Receive Buffers.\n- iwlwifi: add support for getting HW address from CSR.\n- iwlwifi: avoid d0i3 commands when no/init ucode is loaded.\n- iwlwifi: bail out in case of bad trans state.\n- iwlwifi: block the queues when we send ADD_STA for uAPSD.\n- iwlwifi: change the Intel Wireless email address.\n- iwlwifi: check for valid ethernet address provided by OEM.\n- iwlwifi: clean up transport debugfs handling.\n- iwlwifi: clear ieee80211_tx_info-\u003edriver_data in the op_mode.\n- iwlwifi: Document missing module options.\n- iwlwifi: dump prph registers in a common place for all transports.\n- iwlwifi: dvm: advertise NETIF_F_SG.\n- iwlwifi: dvm: fix compare_const_fl.cocci warnings.\n- iwlwifi: dvm: handle zero brightness for wifi LED.\n- iwlwifi: dvm: remove a wrong dependency on m.\n- iwlwifi: dvm: remove Kconfig default.\n- iwlwifi: dvm: remove stray debug code.\n- iwlwifi: export the _no_grab version of PRPH IO functions.\n- iwlwifi: expose fw usniffer mode to more utilities.\n- iwlwifi: fix double hyphen in MODULE_FIRMWARE for 8000.\n- iwlwifi: Fix firmware name maximum length definition.\n- iwlwifi: fix name of ucode loaded for 8265 series.\n- iwlwifi: fix printf specifier.\n- iwlwifi: generalize d0i3_entry_timeout module parameter.\n- iwlwifi: mvm: adapt the firmware assert log to new firmware.\n- iwlwifi: mvm: add 9000-series RX API.\n- iwlwifi: mvm: add 9000 series RX processing.\n- iwlwifi: mvm: add a non-trigger window to fw dbg triggers.\n- iwlwifi: mvm: add an option to start rs from HT/VHT rates.\n- iwlwifi: mvm: Add a station in monitor mode.\n- iwlwifi: mvm: add bt rrc and ttc to debugfs.\n- iwlwifi: mvm: add bt settings to debugfs.\n- iwlwifi: mvm: add ctdp operations to debugfs.\n- iwlwifi: mvm: add CT-KILL notification.\n- iwlwifi: mvm: add debug print if scan config is ignored.\n- iwlwifi: mvm: add extended dwell time.\n- iwlwifi: mvm: add new ADD_STA command version.\n- iwlwifi: mvm: Add P2P client snoozing.\n- iwlwifi: mvm: add registration to cooling device.\n- iwlwifi: mvm: add registration to thermal zone.\n- iwlwifi: mvm: add support for negative temperatures.\n- iwlwifi: mvm: add tlv for multi queue rx support.\n- iwlwifi: mvm: add trigger for firmware dump upon TDLS events.\n- iwlwifi: mvm: add trigger for firmware dump upon TX response status.\n- iwlwifi: mvm: advertise NETIF_F_SG.\n- iwlwifi: mvm: Align bt-coex priority with requirements.\n- iwlwifi: mvm: allow to disable beacon filtering for AP/GO interface.\n- iwlwifi: mvm: avoid harmless -Wmaybe-uninialized warning.\n- iwlwifi: mvm: avoid panics with thermal device usage.\n- iwlwifi: mvm: avoid to WARN about gscan capabilities.\n- iwlwifi: mvm: bail out if CTDP start operation fails.\n- iwlwifi: mvm: bump firmware API to 21.\n- iwlwifi: mvm: bump max API to 20.\n- iwlwifi: mvm: change access to ieee80211_hdr.\n- iwlwifi: mvm: change iwl_mvm_get_key_sta_id() to return the station.\n- iwlwifi: mvm: change mcc update API.\n- iwlwifi: mvm: change name of iwl_mvm_d3_update_gtk.\n- iwlwifi: mvm: Change number of associated stations when station becomes associated.\n- iwlwifi: mvm: change protocol offload flows.\n- iwlwifi: mvm: change the check for ADD_STA status.\n- iwlwifi: mvm: check FW\u0027s response for nvm access write cmd.\n- iwlwifi: mvm: check iwl_mvm_wowlan_config_key_params() return value.\n- iwlwifi: mvm: check minimum temperature notification length.\n- iwlwifi: mvm: cleanup roc te on restart cleanup.\n- iwlwifi: mvm: Configure fragmented scan for scheduled scan.\n- iwlwifi: mvm: configure scheduled scan according to traffic conditions.\n- iwlwifi: mvm: constify the parameters of a few functions in fw-dbg.c.\n- iwlwifi: mvm: Disable beacon storing in D3 when WOWLAN configured.\n- iwlwifi: mvm: disable DQA support.\n- iwlwifi: mvm: Do not switch to D3 image on suspend.\n- iwlwifi: mvm: don\u0027t ask beacons when P2P GO vif and no assoc sta.\n- iwlwifi: mvm: don\u0027t keep an mvm ref when the interface is down.\n- iwlwifi: mvm: don\u0027t let NDPs mess the packet tracking.\n- iwlwifi: mvm: don\u0027t restart HW if suspend fails with unified image.\n- iwlwifi: mvm: don\u0027t try to offload AES-CMAC in AP/IBSS modes.\n- iwlwifi: mvm: drop low_latency_agg_frame_cnt_limit.\n- iwlwifi: mvm: dump more registers upon error.\n- iwlwifi: mvm: dump the radio registers when the firmware crashes.\n- iwlwifi: mvm: enable L3 filtering.\n- iwlwifi: mvm: Enable MPLUT only on supported hw.\n- iwlwifi: mvm: enable VHT MU-MIMO for supported hardware.\n- iwlwifi: mvm: extend time event duration.\n- iwlwifi: mvm: fix accessing Null pointer during fw dump collection.\n- iwlwifi: mvm: fix d3_test with unified D0/D3 images.\n- iwlwifi: mvm: fix debugfs signedness warning.\n- iwlwifi: mvm: fix extended dwell time.\n- iwlwifi: mvm: fix incorrect fallthrough in iwl_mvm_check_running_scans().\n- iwlwifi: mvm: fix memory leaks in error paths upon fw error dump.\n- iwlwifi: mvm: fix netdetect starting/stopping for unified images.\n- iwlwifi: mvm: fix RSS key sizing.\n- iwlwifi: mvm: fix unregistration of thermal in some error flows.\n- iwlwifi: mvm: flush all used TX queues before suspending.\n- iwlwifi: mvm: forbid U-APSD for P2P Client if the firmware doesn\u0027t support it.\n- iwlwifi: mvm: handle pass all scan reporting.\n- iwlwifi: mvm: ignore LMAC scan notifications when running UMAC scans.\n- iwlwifi: mvm: infrastructure for frame-release message.\n- iwlwifi: mvm: kill iwl_mvm_enable_agg_txq.\n- iwlwifi: mvm: let the firmware choose the antenna for beacons.\n- iwlwifi: mvm: make collecting fw debug data optional.\n- iwlwifi: mvm: move fw-dbg code to separate file.\n- iwlwifi: mvm: only release the trans ref if d0i3 is supported in fw.\n- iwlwifi: mvm: prepare the code towards TSO implementation.\n- iwlwifi: mvm: refactor d3 key update functions.\n- iwlwifi: mvm: refactor the way fw_key_table is handled.\n- iwlwifi: mvm: remove an extra tab.\n- iwlwifi: mvm: Remove bf_vif from iwl_power_vifs.\n- iwlwifi: mvm: Remove iwl_mvm_update_beacon_abort.\n- iwlwifi: mvm: remove redundant d0i3 flag from the config struct.\n- iwlwifi: mvm: remove shadowing variable.\n- iwlwifi: mvm: remove stray nd_config element.\n- iwlwifi: mvm: remove the vif parameter of iwl_mvm_configure_bcast_filter().\n- iwlwifi: mvm: remove unnecessary check in iwl_mvm_is_d0i3_supported().\n- iwlwifi: mvm: remove useless WARN_ON and rely on cfg80211\u0027s combination.\n- iwlwifi: mvm: report wakeup for wowlan.\n- iwlwifi: mvm: reset mvm-\u003escan_type when firmware is started.\n- iwlwifi: mvm: return the cooling state index instead of the budget.\n- iwlwifi: mvm: ROC: cleanup time event info on FW failure.\n- iwlwifi: mvm: ROC: Extend the ROC max delay duration \u0026 limit ROC duration.\n- iwlwifi: mvm: rs: fix a potential out of bounds access.\n- iwlwifi: mvm: rs: fix a theoretical access to uninitialized array elements.\n- iwlwifi: mvm: rs: fix a warning message.\n- iwlwifi: mvm: rs: fix TPC action decision algorithm.\n- iwlwifi: mvm: rs: fix TPC statistics handling.\n- iwlwifi: mvm: Send power command on BSS_CHANGED_BEACON_INFO if needed.\n- iwlwifi: mvm: set default new STA as non-aggregated.\n- iwlwifi: mvm: set the correct amsdu enum values.\n- iwlwifi: mvm: set the correct descriptor size for tracing.\n- iwlwifi: mvm: small update in the firmware API.\n- iwlwifi: mvm: support A-MSDU in A-MPDU.\n- iwlwifi: mvm: support beacon storing.\n- iwlwifi: mvm: support description for user triggered fw dbg collection.\n- iwlwifi: mvm: support rss queues configuration command.\n- iwlwifi: mvm: Support setting continuous recording debug mode.\n- iwlwifi: mvm: support setting minimum quota from debugfs.\n- iwlwifi: mvm: support sw queue start/stop from mvm.\n- iwlwifi: mvm: take care of padded packets.\n- iwlwifi: mvm: take the transport ref back when leaving.\n- iwlwifi: mvm: track low-latency sources separately.\n- iwlwifi: mvm: update GSCAN capabilities.\n- iwlwifi: mvm: update ucode status before stopping device.\n- iwlwifi: mvm: use build-time assertion for fw trigger ID.\n- iwlwifi: mvm: use firmware station lookup, combine code.\n- iwlwifi: mvm: various trivial cleanups.\n- iwlwifi: mvm: writing zero bytes to debugfs causes a crash.\n- iwlwifi: nvm: fix loading default NVM file.\n- iwlwifi: nvm: fix up phy section when reading it.\n- iwlwifi: pcie: add 9000 series multi queue rx DMA support.\n- iwlwifi: pcie: add infrastructure for multi-queue rx.\n- iwlwifi: pcie: add initial RTPM support for PCI.\n- iwlwifi: pcie: Add new configuration to enable MSIX.\n- iwlwifi: pcie: add pm_prepare and pm_complete ops.\n- iwlwifi: pcie: add RTPM support when wifi is enabled.\n- iwlwifi: pcie: aggregate Flow Handler configuration writes.\n- iwlwifi: pcie: allow the op_mode to block the tx queues.\n- iwlwifi: pcie: allow to pretend to have Tx CSUM for debug.\n- iwlwifi: pcie: avoid restocks inside rx loop if not emergency.\n- iwlwifi: pcie: buffer packets to avoid overflowing Tx queues.\n- iwlwifi: pcie: build an A-MSDU using TSO core.\n- iwlwifi: pcie: configure more RFH settings.\n- iwlwifi: pcie: detect and workaround invalid write ptr behavior.\n- iwlwifi: pcie: don\u0027t increment / decrement a bool.\n- iwlwifi: pcie: enable interrupts before releasing the NIC\u0027s CPU.\n- iwlwifi: pcie: enable multi-queue rx path.\n- iwlwifi: pcie: extend device reset delay.\n- iwlwifi: pcie: fine tune number of rxbs.\n- iwlwifi: pcie: fix a race in firmware loading flow.\n- iwlwifi: pcie: fix erroneous return value.\n- iwlwifi: pcie: fix global table size.\n- iwlwifi: pcie: fix identation in trans.c.\n- iwlwifi: pcie: fix RF-Kill vs. firmware load race.\n- iwlwifi: pcie: forbid RTPM on device removal.\n- iwlwifi: pcie: mark command queue lock with separate lockdep class.\n- iwlwifi: pcie: prevent skbs shadowing in iwl_trans_pcie_reclaim.\n- iwlwifi: pcie: refactor RXBs reclaiming code.\n- iwlwifi: pcie: remove ICT allocation message.\n- iwlwifi: pcie: remove pointer from debug message.\n- iwlwifi: pcie: re-organize code towards TSO.\n- iwlwifi: pcie: set RB chunk size back to 64.\n- iwlwifi: pcie: update iwl_mpdu_desc fields.\n- iwlwifi: print index in api/capa flags parsing message.\n- iwlwifi: refactor the code that reads the MAC address from the NVM.\n- iwlwifi: remove IWL_DL_LED.\n- iwlwifi: remove unused parameter from grab_nic_access.\n- iwlwifi: replace d0i3_mode and wowlan_d0i3 with more generic variables.\n- iwlwifi: set max firmware version of 7265 to 17.\n- iwlwifi: support ucode with d0 unified image - regular and usniffer.\n- iwlwifi: trans: make various conversion macros inlines.\n- iwlwifi: trans: support a callback for ASYNC commands.\n- iwlwifi: treat iwl_parse_nvm_data() MAC addr as little endian.\n- iwlwifi: tt: move ucode_loaded check under mutex.\n- iwlwifi: uninline iwl_trans_send_cmd.\n- iwlwifi: update host command messages to new format.\n- iwlwifi: Update PCI IDs for 8000 and 9000 series.\n- iwlwifi: update support for 3168 series firmware and NVM.\n- iwlwifi: various comments and code cleanups.\n- kabi: ignore fs_info parameter for tracepoints that didn\u0027t have it (bsc#1044912).\n- kabi/severities: ignore kABi changes in iwlwifi stuff itself\n- lan78xx: use skb_cow_head() to deal with cloned skbs (bsc#1045154).\n- Linux 4.4.74 (CVE-2017-1000364 bnc#1012382 bnc#1039348 bnc#1045340 bsc#1031717 bsc#1043231).\n- loop: Add PF_LESS_THROTTLE to block/loop device thread (bsc#1027101).\n- md: fix a null dereference (bsc#1040351).\n- md: use a separate bio_set for synchronous IO (bsc#1040351).\n- mm: fix new crash in unmapped_area_topdown() (bnc#1039348).\n- mm: larger stack guard gap, between vmas (bnc#1039348, CVE-2017-1000364, bnc#1045340).\n- net/mlx5e: Fix timestamping capabilities reporting (bsc#966170 bsc#1015342).\n- NFSv4: don\u0027t let hanging mounts block other mounts (bsc#1040364).\n- powerpc/fadump: add reschedule point while releasing memory (bsc#1040609).\n- powerpc/fadump: avoid duplicates in crash memory ranges (bsc#1037669).\n- powerpc/fadump: avoid holes in boot memory area when fadump is registered (bsc#1037669).\n- powerpc/fadump: provide a helpful error message (bsc#1037669).\n- powerpc/fadump: return error when fadump registration fails (bsc#1040567).\n- powerpc/ftrace: Pass the correct stack pointer for DYNAMIC_FTRACE_WITH_REGS (FATE#322421).\n- printk: Correctly handle preemption in console_unlock() (bsc#1046434).\n- printk/xen: Force printk sync mode when migrating Xen guest (bsc#1043347).\n- RDMA/iw_cxgb4: Always wake up waiter in c4iw_peer_abort_intr() (bsc#1026570).\n- Reenable and refresh patches.suse/iwlwifi-expose-default-fallback-ucode-api.\n- reiserfs: don\u0027t preallocate blocks for extended attributes (bsc#990682).\n- smartpqi: limit transfer length to 1MB (bsc#1025461).\n- tty: Destroy ldisc instance on hangup (bnc#1043488).\n- tty: Fix ldisc crash on reopened tty (bnc#1043488).\n- tty: Handle NULL tty-\u003eldisc (bnc#1043488).\n- tty: Move tty_ldisc_kill() (bnc#1043488).\n- tty: Prepare for destroying line discipline on hangup (bnc#1043488).\n- tty: Refactor tty_ldisc_reinit() for reuse (bnc#1043488).\n- tty: Reset c_line from driver\u0027s init_termios (bnc#1043488).\n- tty: Simplify tty_set_ldisc() exit handling (bnc#1043488).\n- tty: Use \u0027disc\u0027 for line discipline index name (bnc#1043488).\n- Update config files: add CONFIG_IWLWIFI_PCIE_RTPM=y (FATE#323335)\n- Update patches.fixes/xfs-split-default-quota-limits-by-quota-type.patch (bsc#1040941). Fix the bug nr used.\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP2-2017-1231", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1990-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:1990-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171990-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:1990-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003073.html" }, { "category": "self", "summary": "SUSE Bug 1000092", "url": "https://bugzilla.suse.com/1000092" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003581", "url": "https://bugzilla.suse.com/1003581" }, { "category": "self", "summary": "SUSE Bug 1004003", "url": "https://bugzilla.suse.com/1004003" }, { "category": "self", "summary": "SUSE Bug 1007729", "url": "https://bugzilla.suse.com/1007729" }, { "category": "self", "summary": "SUSE Bug 1007959", "url": "https://bugzilla.suse.com/1007959" }, { "category": "self", "summary": "SUSE Bug 1007962", "url": "https://bugzilla.suse.com/1007962" }, { "category": "self", "summary": "SUSE Bug 1008842", "url": "https://bugzilla.suse.com/1008842" }, { "category": "self", "summary": "SUSE Bug 1009674", "url": "https://bugzilla.suse.com/1009674" }, { "category": "self", "summary": "SUSE Bug 1009718", "url": "https://bugzilla.suse.com/1009718" }, { "category": "self", "summary": "SUSE Bug 1010032", "url": "https://bugzilla.suse.com/1010032" }, { "category": "self", "summary": "SUSE Bug 1010612", "url": "https://bugzilla.suse.com/1010612" }, { "category": "self", "summary": "SUSE Bug 1010690", "url": "https://bugzilla.suse.com/1010690" }, { "category": "self", "summary": "SUSE Bug 1011044", "url": "https://bugzilla.suse.com/1011044" }, { "category": "self", "summary": "SUSE Bug 1011176", "url": "https://bugzilla.suse.com/1011176" }, { "category": "self", "summary": "SUSE Bug 1011913", "url": "https://bugzilla.suse.com/1011913" }, { "category": "self", "summary": "SUSE Bug 1012060", "url": "https://bugzilla.suse.com/1012060" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012452", "url": "https://bugzilla.suse.com/1012452" }, { "category": "self", "summary": "SUSE Bug 1012829", "url": "https://bugzilla.suse.com/1012829" }, { "category": "self", "summary": "SUSE Bug 1012910", "url": "https://bugzilla.suse.com/1012910" }, { "category": "self", "summary": "SUSE Bug 1012985", "url": "https://bugzilla.suse.com/1012985" }, { "category": "self", "summary": "SUSE Bug 1013001", "url": "https://bugzilla.suse.com/1013001" }, { "category": "self", "summary": "SUSE Bug 1013561", "url": "https://bugzilla.suse.com/1013561" }, { "category": "self", "summary": "SUSE Bug 1013792", "url": "https://bugzilla.suse.com/1013792" }, { "category": "self", "summary": "SUSE Bug 1013887", "url": "https://bugzilla.suse.com/1013887" }, { "category": "self", "summary": "SUSE Bug 1013994", "url": "https://bugzilla.suse.com/1013994" }, { "category": "self", "summary": "SUSE Bug 1014120", "url": "https://bugzilla.suse.com/1014120" }, { "category": "self", "summary": "SUSE Bug 1014136", "url": "https://bugzilla.suse.com/1014136" }, { "category": "self", "summary": "SUSE Bug 1015342", "url": "https://bugzilla.suse.com/1015342" }, { "category": "self", "summary": "SUSE Bug 1015367", "url": "https://bugzilla.suse.com/1015367" }, { "category": "self", "summary": "SUSE Bug 1015452", "url": "https://bugzilla.suse.com/1015452" }, { "category": "self", "summary": "SUSE Bug 1015609", "url": "https://bugzilla.suse.com/1015609" }, { "category": "self", "summary": "SUSE Bug 1016403", "url": "https://bugzilla.suse.com/1016403" }, { "category": "self", "summary": "SUSE Bug 1017164", "url": "https://bugzilla.suse.com/1017164" }, { "category": "self", "summary": "SUSE Bug 1017170", "url": "https://bugzilla.suse.com/1017170" }, { "category": "self", "summary": "SUSE Bug 1017410", "url": "https://bugzilla.suse.com/1017410" }, { "category": "self", "summary": "SUSE Bug 1017461", "url": "https://bugzilla.suse.com/1017461" }, { "category": "self", "summary": "SUSE Bug 1017641", "url": "https://bugzilla.suse.com/1017641" }, { "category": "self", "summary": "SUSE Bug 1018100", "url": "https://bugzilla.suse.com/1018100" }, { "category": "self", "summary": "SUSE Bug 1018263", "url": "https://bugzilla.suse.com/1018263" }, { "category": "self", "summary": "SUSE Bug 1018358", "url": "https://bugzilla.suse.com/1018358" }, { "category": "self", "summary": "SUSE Bug 1018385", "url": "https://bugzilla.suse.com/1018385" }, { "category": "self", "summary": "SUSE Bug 1018419", "url": "https://bugzilla.suse.com/1018419" }, { "category": "self", "summary": "SUSE Bug 1018446", "url": "https://bugzilla.suse.com/1018446" }, { "category": "self", "summary": "SUSE Bug 1018813", "url": "https://bugzilla.suse.com/1018813" }, { "category": "self", "summary": "SUSE Bug 1018885", "url": "https://bugzilla.suse.com/1018885" }, { "category": "self", "summary": "SUSE Bug 1018913", "url": "https://bugzilla.suse.com/1018913" }, { "category": "self", "summary": "SUSE Bug 1019061", "url": "https://bugzilla.suse.com/1019061" }, { "category": "self", "summary": "SUSE Bug 1019148", "url": "https://bugzilla.suse.com/1019148" }, { "category": "self", "summary": "SUSE Bug 1019163", "url": "https://bugzilla.suse.com/1019163" }, { "category": "self", "summary": "SUSE Bug 1019168", "url": "https://bugzilla.suse.com/1019168" }, { "category": "self", "summary": "SUSE Bug 1019260", "url": "https://bugzilla.suse.com/1019260" }, { "category": "self", "summary": "SUSE Bug 1019351", "url": "https://bugzilla.suse.com/1019351" }, { "category": "self", "summary": "SUSE Bug 1019594", "url": "https://bugzilla.suse.com/1019594" }, { "category": "self", "summary": "SUSE Bug 1019614", "url": "https://bugzilla.suse.com/1019614" }, { "category": "self", "summary": "SUSE Bug 1019618", "url": "https://bugzilla.suse.com/1019618" }, { "category": "self", "summary": "SUSE Bug 1019630", "url": "https://bugzilla.suse.com/1019630" }, { "category": "self", "summary": "SUSE Bug 1019631", "url": "https://bugzilla.suse.com/1019631" }, { "category": "self", "summary": "SUSE Bug 1019784", "url": "https://bugzilla.suse.com/1019784" }, { "category": "self", "summary": "SUSE Bug 1019851", "url": "https://bugzilla.suse.com/1019851" }, { "category": "self", "summary": "SUSE Bug 1020048", "url": "https://bugzilla.suse.com/1020048" }, { "category": "self", "summary": "SUSE Bug 1020214", "url": "https://bugzilla.suse.com/1020214" }, { "category": "self", "summary": "SUSE Bug 1020412", "url": "https://bugzilla.suse.com/1020412" }, { "category": "self", "summary": "SUSE Bug 1020488", "url": "https://bugzilla.suse.com/1020488" }, { "category": "self", "summary": "SUSE Bug 1020602", "url": "https://bugzilla.suse.com/1020602" }, { "category": "self", "summary": "SUSE Bug 1020685", "url": "https://bugzilla.suse.com/1020685" }, { "category": "self", "summary": "SUSE Bug 1020817", "url": "https://bugzilla.suse.com/1020817" }, { "category": "self", "summary": "SUSE Bug 1020945", "url": "https://bugzilla.suse.com/1020945" }, { "category": "self", "summary": "SUSE Bug 1020975", "url": "https://bugzilla.suse.com/1020975" }, { "category": "self", "summary": "SUSE Bug 1021082", "url": "https://bugzilla.suse.com/1021082" }, { "category": "self", "summary": "SUSE Bug 1021248", "url": "https://bugzilla.suse.com/1021248" }, { "category": "self", "summary": "SUSE Bug 1021251", "url": "https://bugzilla.suse.com/1021251" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 1021260", "url": "https://bugzilla.suse.com/1021260" }, { "category": "self", "summary": "SUSE Bug 1021294", "url": "https://bugzilla.suse.com/1021294" }, { "category": "self", "summary": "SUSE Bug 1021424", "url": "https://bugzilla.suse.com/1021424" }, { "category": "self", "summary": "SUSE Bug 1021455", "url": "https://bugzilla.suse.com/1021455" }, { "category": "self", "summary": "SUSE Bug 1021474", "url": "https://bugzilla.suse.com/1021474" }, { "category": "self", "summary": "SUSE Bug 1021762", "url": "https://bugzilla.suse.com/1021762" }, { "category": "self", "summary": "SUSE Bug 1022181", "url": "https://bugzilla.suse.com/1022181" }, { "category": "self", "summary": "SUSE Bug 1022266", "url": "https://bugzilla.suse.com/1022266" }, { "category": "self", "summary": "SUSE Bug 1022304", "url": "https://bugzilla.suse.com/1022304" }, { "category": "self", "summary": "SUSE Bug 1022340", "url": "https://bugzilla.suse.com/1022340" }, { "category": "self", "summary": "SUSE Bug 1022429", "url": "https://bugzilla.suse.com/1022429" }, { "category": "self", "summary": "SUSE Bug 1022476", "url": "https://bugzilla.suse.com/1022476" }, { "category": "self", "summary": "SUSE Bug 1022547", "url": "https://bugzilla.suse.com/1022547" }, { "category": "self", "summary": "SUSE Bug 1022559", "url": "https://bugzilla.suse.com/1022559" }, { "category": "self", "summary": "SUSE Bug 1022595", "url": "https://bugzilla.suse.com/1022595" }, { "category": "self", "summary": "SUSE Bug 1022785", "url": "https://bugzilla.suse.com/1022785" }, { "category": "self", "summary": "SUSE Bug 1022971", "url": "https://bugzilla.suse.com/1022971" }, { "category": "self", "summary": "SUSE Bug 1023101", "url": "https://bugzilla.suse.com/1023101" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1023287", "url": "https://bugzilla.suse.com/1023287" }, { "category": "self", "summary": "SUSE Bug 1023762", "url": "https://bugzilla.suse.com/1023762" }, { "category": "self", "summary": "SUSE Bug 1023866", "url": "https://bugzilla.suse.com/1023866" }, { "category": "self", "summary": "SUSE Bug 1023884", "url": "https://bugzilla.suse.com/1023884" }, { "category": "self", "summary": "SUSE Bug 1023888", "url": "https://bugzilla.suse.com/1023888" }, { "category": "self", "summary": "SUSE Bug 1024015", "url": "https://bugzilla.suse.com/1024015" }, { "category": "self", "summary": "SUSE Bug 1024081", "url": "https://bugzilla.suse.com/1024081" }, { "category": "self", "summary": "SUSE Bug 1024234", "url": "https://bugzilla.suse.com/1024234" }, { "category": "self", "summary": "SUSE Bug 1024508", "url": "https://bugzilla.suse.com/1024508" }, { "category": "self", "summary": "SUSE Bug 1024938", "url": "https://bugzilla.suse.com/1024938" }, { "category": "self", "summary": "SUSE Bug 1025039", "url": "https://bugzilla.suse.com/1025039" }, { "category": "self", "summary": "SUSE Bug 1025235", "url": "https://bugzilla.suse.com/1025235" }, { "category": "self", "summary": "SUSE Bug 1025461", "url": "https://bugzilla.suse.com/1025461" }, { "category": "self", "summary": "SUSE Bug 1025683", "url": "https://bugzilla.suse.com/1025683" }, { "category": "self", "summary": "SUSE Bug 1026024", "url": "https://bugzilla.suse.com/1026024" }, { "category": "self", "summary": "SUSE Bug 1026405", "url": "https://bugzilla.suse.com/1026405" }, { "category": "self", "summary": "SUSE Bug 1026462", "url": "https://bugzilla.suse.com/1026462" }, { "category": "self", "summary": "SUSE Bug 1026505", "url": "https://bugzilla.suse.com/1026505" }, { "category": "self", "summary": "SUSE Bug 1026509", "url": "https://bugzilla.suse.com/1026509" }, { "category": "self", "summary": "SUSE Bug 1026570", "url": "https://bugzilla.suse.com/1026570" }, { "category": "self", "summary": "SUSE Bug 1026692", "url": "https://bugzilla.suse.com/1026692" }, { "category": "self", "summary": "SUSE Bug 1026722", "url": "https://bugzilla.suse.com/1026722" }, { "category": "self", "summary": "SUSE Bug 1027054", "url": "https://bugzilla.suse.com/1027054" }, { "category": "self", "summary": "SUSE Bug 1027066", "url": "https://bugzilla.suse.com/1027066" }, { "category": "self", "summary": "SUSE Bug 1027101", "url": "https://bugzilla.suse.com/1027101" }, { "category": "self", "summary": "SUSE Bug 1027153", "url": "https://bugzilla.suse.com/1027153" }, { "category": "self", "summary": "SUSE Bug 1027179", "url": "https://bugzilla.suse.com/1027179" }, { "category": "self", "summary": "SUSE Bug 1027189", "url": "https://bugzilla.suse.com/1027189" }, { "category": "self", "summary": "SUSE Bug 1027190", "url": "https://bugzilla.suse.com/1027190" }, { "category": "self", "summary": "SUSE Bug 1027195", "url": "https://bugzilla.suse.com/1027195" }, { "category": "self", "summary": "SUSE Bug 1027273", "url": "https://bugzilla.suse.com/1027273" }, { "category": "self", "summary": "SUSE Bug 1027512", "url": "https://bugzilla.suse.com/1027512" }, { "category": "self", "summary": "SUSE Bug 1027565", "url": "https://bugzilla.suse.com/1027565" }, { "category": "self", "summary": "SUSE Bug 1027616", "url": "https://bugzilla.suse.com/1027616" }, { "category": "self", "summary": "SUSE Bug 1027974", "url": "https://bugzilla.suse.com/1027974" }, { "category": "self", "summary": "SUSE Bug 1028017", "url": "https://bugzilla.suse.com/1028017" }, { "category": "self", "summary": "SUSE Bug 1028027", "url": "https://bugzilla.suse.com/1028027" }, { "category": "self", "summary": "SUSE Bug 1028041", "url": "https://bugzilla.suse.com/1028041" }, { "category": "self", "summary": "SUSE Bug 1028158", "url": "https://bugzilla.suse.com/1028158" }, { "category": "self", "summary": "SUSE Bug 1028217", "url": "https://bugzilla.suse.com/1028217" }, { "category": "self", "summary": "SUSE Bug 1028310", "url": "https://bugzilla.suse.com/1028310" }, { "category": "self", "summary": "SUSE Bug 1028325", "url": "https://bugzilla.suse.com/1028325" }, { "category": "self", "summary": "SUSE Bug 1028340", "url": "https://bugzilla.suse.com/1028340" }, { "category": "self", "summary": "SUSE Bug 1028372", "url": "https://bugzilla.suse.com/1028372" }, { "category": "self", "summary": "SUSE Bug 1028415", "url": "https://bugzilla.suse.com/1028415" }, { "category": "self", "summary": "SUSE Bug 1028819", "url": "https://bugzilla.suse.com/1028819" }, { "category": "self", "summary": "SUSE Bug 1028883", "url": "https://bugzilla.suse.com/1028883" }, { "category": "self", "summary": "SUSE Bug 1028895", "url": "https://bugzilla.suse.com/1028895" }, { "category": "self", "summary": "SUSE Bug 1029220", "url": "https://bugzilla.suse.com/1029220" }, { "category": "self", "summary": "SUSE Bug 1029514", "url": "https://bugzilla.suse.com/1029514" }, { "category": "self", "summary": "SUSE Bug 1029607", "url": "https://bugzilla.suse.com/1029607" }, { "category": "self", "summary": "SUSE Bug 1029634", "url": "https://bugzilla.suse.com/1029634" }, { "category": "self", "summary": "SUSE Bug 1029986", "url": "https://bugzilla.suse.com/1029986" }, { "category": "self", "summary": "SUSE Bug 1030057", "url": "https://bugzilla.suse.com/1030057" }, { "category": "self", "summary": "SUSE Bug 1030070", "url": "https://bugzilla.suse.com/1030070" }, { "category": "self", "summary": "SUSE Bug 1030118", "url": "https://bugzilla.suse.com/1030118" }, { "category": "self", "summary": "SUSE Bug 1030213", "url": "https://bugzilla.suse.com/1030213" }, { "category": "self", "summary": "SUSE Bug 1030573", "url": "https://bugzilla.suse.com/1030573" }, { "category": "self", "summary": "SUSE Bug 1031003", "url": "https://bugzilla.suse.com/1031003" }, { "category": "self", "summary": "SUSE Bug 1031040", "url": "https://bugzilla.suse.com/1031040" }, { "category": "self", "summary": "SUSE Bug 1031052", "url": "https://bugzilla.suse.com/1031052" }, { "category": "self", "summary": "SUSE Bug 1031142", "url": "https://bugzilla.suse.com/1031142" }, { "category": "self", "summary": "SUSE Bug 1031147", "url": "https://bugzilla.suse.com/1031147" }, { "category": "self", "summary": "SUSE Bug 1031200", "url": "https://bugzilla.suse.com/1031200" }, { "category": "self", "summary": "SUSE Bug 1031206", "url": "https://bugzilla.suse.com/1031206" }, { "category": "self", "summary": "SUSE Bug 1031208", "url": "https://bugzilla.suse.com/1031208" }, { "category": "self", "summary": "SUSE Bug 1031440", "url": "https://bugzilla.suse.com/1031440" }, { "category": "self", "summary": "SUSE Bug 1031470", "url": "https://bugzilla.suse.com/1031470" }, { "category": "self", "summary": "SUSE Bug 1031500", "url": "https://bugzilla.suse.com/1031500" }, { "category": "self", "summary": "SUSE Bug 1031512", "url": "https://bugzilla.suse.com/1031512" }, { "category": "self", "summary": "SUSE Bug 1031555", "url": "https://bugzilla.suse.com/1031555" }, { "category": "self", "summary": "SUSE Bug 1031579", "url": "https://bugzilla.suse.com/1031579" }, { "category": "self", "summary": "SUSE Bug 1031662", "url": "https://bugzilla.suse.com/1031662" }, { "category": "self", "summary": "SUSE Bug 1031717", "url": "https://bugzilla.suse.com/1031717" }, { "category": "self", "summary": "SUSE Bug 1031796", "url": "https://bugzilla.suse.com/1031796" }, { "category": "self", "summary": "SUSE Bug 1031831", "url": "https://bugzilla.suse.com/1031831" }, { "category": "self", "summary": "SUSE Bug 1032006", "url": "https://bugzilla.suse.com/1032006" }, { "category": "self", "summary": "SUSE Bug 1032141", "url": "https://bugzilla.suse.com/1032141" }, { "category": "self", "summary": "SUSE Bug 1032339", "url": "https://bugzilla.suse.com/1032339" }, { "category": "self", "summary": "SUSE Bug 1032345", "url": "https://bugzilla.suse.com/1032345" }, { "category": "self", "summary": "SUSE Bug 1032400", "url": "https://bugzilla.suse.com/1032400" }, { "category": "self", "summary": "SUSE Bug 1032581", "url": "https://bugzilla.suse.com/1032581" }, { "category": "self", "summary": "SUSE Bug 1032673", "url": "https://bugzilla.suse.com/1032673" }, { "category": "self", "summary": "SUSE Bug 1032681", "url": "https://bugzilla.suse.com/1032681" }, { "category": "self", "summary": "SUSE Bug 1032803", "url": "https://bugzilla.suse.com/1032803" }, { "category": "self", "summary": "SUSE Bug 1033117", "url": "https://bugzilla.suse.com/1033117" }, { "category": "self", "summary": "SUSE Bug 1033281", "url": "https://bugzilla.suse.com/1033281" }, { "category": "self", "summary": "SUSE Bug 1033287", "url": "https://bugzilla.suse.com/1033287" }, { "category": "self", "summary": "SUSE Bug 1033336", "url": "https://bugzilla.suse.com/1033336" }, { "category": "self", "summary": "SUSE Bug 1033340", "url": "https://bugzilla.suse.com/1033340" }, { "category": "self", "summary": "SUSE Bug 1033885", "url": "https://bugzilla.suse.com/1033885" }, { "category": "self", "summary": "SUSE Bug 1034048", "url": "https://bugzilla.suse.com/1034048" }, { "category": "self", "summary": "SUSE Bug 1034419", "url": "https://bugzilla.suse.com/1034419" }, { "category": "self", "summary": "SUSE Bug 1034635", "url": "https://bugzilla.suse.com/1034635" }, { "category": "self", "summary": "SUSE Bug 1034670", "url": "https://bugzilla.suse.com/1034670" }, { "category": "self", "summary": "SUSE Bug 1034671", "url": "https://bugzilla.suse.com/1034671" }, { "category": "self", "summary": "SUSE Bug 1034762", "url": "https://bugzilla.suse.com/1034762" }, { "category": "self", "summary": "SUSE Bug 1034902", "url": "https://bugzilla.suse.com/1034902" }, { "category": "self", "summary": "SUSE Bug 1034995", "url": "https://bugzilla.suse.com/1034995" }, { "category": "self", "summary": "SUSE Bug 1035024", "url": "https://bugzilla.suse.com/1035024" }, { "category": "self", "summary": "SUSE Bug 1035866", "url": "https://bugzilla.suse.com/1035866" }, { "category": "self", "summary": "SUSE Bug 1035887", "url": "https://bugzilla.suse.com/1035887" }, { "category": "self", "summary": "SUSE Bug 1035920", "url": "https://bugzilla.suse.com/1035920" }, { "category": "self", "summary": "SUSE Bug 1035922", "url": "https://bugzilla.suse.com/1035922" }, { "category": "self", "summary": "SUSE Bug 1036214", "url": "https://bugzilla.suse.com/1036214" }, { "category": "self", "summary": "SUSE Bug 1036638", "url": "https://bugzilla.suse.com/1036638" }, { "category": "self", "summary": "SUSE Bug 1036752", "url": "https://bugzilla.suse.com/1036752" }, { "category": "self", "summary": "SUSE Bug 1036763", "url": "https://bugzilla.suse.com/1036763" }, { "category": "self", "summary": "SUSE Bug 1037177", "url": "https://bugzilla.suse.com/1037177" }, { "category": "self", "summary": "SUSE Bug 1037186", "url": "https://bugzilla.suse.com/1037186" }, { "category": "self", "summary": "SUSE Bug 1037384", "url": "https://bugzilla.suse.com/1037384" }, { "category": "self", "summary": "SUSE Bug 1037483", "url": "https://bugzilla.suse.com/1037483" }, { "category": "self", "summary": "SUSE Bug 1037669", "url": "https://bugzilla.suse.com/1037669" }, { "category": "self", "summary": "SUSE Bug 1037840", "url": "https://bugzilla.suse.com/1037840" }, { "category": "self", "summary": "SUSE Bug 1037871", "url": "https://bugzilla.suse.com/1037871" }, { "category": "self", "summary": "SUSE Bug 1037969", "url": "https://bugzilla.suse.com/1037969" }, { "category": "self", "summary": "SUSE Bug 1038033", "url": "https://bugzilla.suse.com/1038033" }, { "category": "self", "summary": "SUSE Bug 1038043", "url": "https://bugzilla.suse.com/1038043" }, { "category": "self", "summary": "SUSE Bug 1038085", "url": "https://bugzilla.suse.com/1038085" }, { "category": "self", "summary": "SUSE Bug 1038142", "url": "https://bugzilla.suse.com/1038142" }, { "category": "self", "summary": "SUSE Bug 1038143", "url": "https://bugzilla.suse.com/1038143" }, { "category": "self", "summary": "SUSE Bug 1038297", "url": "https://bugzilla.suse.com/1038297" }, { "category": "self", "summary": "SUSE Bug 1038458", "url": "https://bugzilla.suse.com/1038458" }, { "category": "self", "summary": "SUSE Bug 1038544", "url": "https://bugzilla.suse.com/1038544" }, { "category": "self", "summary": "SUSE Bug 1038842", "url": "https://bugzilla.suse.com/1038842" }, { "category": "self", "summary": "SUSE Bug 1038843", "url": "https://bugzilla.suse.com/1038843" }, { "category": "self", "summary": "SUSE Bug 1038846", "url": "https://bugzilla.suse.com/1038846" }, { "category": "self", "summary": "SUSE Bug 1038847", "url": "https://bugzilla.suse.com/1038847" }, { "category": "self", "summary": "SUSE Bug 1038848", "url": "https://bugzilla.suse.com/1038848" }, { "category": "self", "summary": "SUSE Bug 1038879", "url": "https://bugzilla.suse.com/1038879" }, { "category": "self", "summary": "SUSE Bug 1038981", "url": "https://bugzilla.suse.com/1038981" }, { "category": "self", "summary": "SUSE Bug 1038982", "url": "https://bugzilla.suse.com/1038982" }, { "category": "self", "summary": "SUSE Bug 1039348", "url": "https://bugzilla.suse.com/1039348" }, { "category": "self", "summary": "SUSE Bug 1039354", "url": "https://bugzilla.suse.com/1039354" }, { "category": "self", "summary": "SUSE Bug 1039700", "url": "https://bugzilla.suse.com/1039700" }, { "category": "self", "summary": "SUSE Bug 1039864", "url": "https://bugzilla.suse.com/1039864" }, { "category": "self", "summary": "SUSE Bug 1039882", "url": "https://bugzilla.suse.com/1039882" }, { "category": "self", "summary": "SUSE Bug 1039883", "url": "https://bugzilla.suse.com/1039883" }, { "category": "self", "summary": "SUSE Bug 1039885", "url": "https://bugzilla.suse.com/1039885" }, { "category": "self", "summary": "SUSE Bug 1039900", "url": "https://bugzilla.suse.com/1039900" }, { "category": "self", "summary": "SUSE Bug 1040069", "url": "https://bugzilla.suse.com/1040069" }, { "category": "self", "summary": "SUSE Bug 1040125", "url": "https://bugzilla.suse.com/1040125" }, { "category": "self", "summary": "SUSE Bug 1040182", "url": "https://bugzilla.suse.com/1040182" }, { "category": "self", "summary": "SUSE Bug 1040279", "url": "https://bugzilla.suse.com/1040279" }, { "category": "self", "summary": "SUSE Bug 1040351", "url": "https://bugzilla.suse.com/1040351" }, { "category": "self", "summary": "SUSE Bug 1040364", "url": "https://bugzilla.suse.com/1040364" }, { "category": "self", "summary": "SUSE Bug 1040395", "url": "https://bugzilla.suse.com/1040395" }, { "category": "self", "summary": "SUSE Bug 1040425", "url": "https://bugzilla.suse.com/1040425" }, { "category": "self", "summary": "SUSE Bug 1040463", "url": "https://bugzilla.suse.com/1040463" }, { "category": "self", "summary": "SUSE Bug 1040567", "url": "https://bugzilla.suse.com/1040567" }, { "category": "self", "summary": "SUSE Bug 1040609", "url": "https://bugzilla.suse.com/1040609" }, { "category": "self", "summary": "SUSE Bug 1040855", "url": "https://bugzilla.suse.com/1040855" }, { "category": "self", "summary": "SUSE Bug 1040929", "url": "https://bugzilla.suse.com/1040929" }, { "category": "self", "summary": "SUSE Bug 1040941", "url": "https://bugzilla.suse.com/1040941" }, { "category": "self", "summary": "SUSE Bug 1041087", "url": "https://bugzilla.suse.com/1041087" }, { "category": "self", "summary": "SUSE Bug 1041160", "url": "https://bugzilla.suse.com/1041160" }, { "category": "self", "summary": "SUSE Bug 1041168", "url": "https://bugzilla.suse.com/1041168" }, { "category": "self", "summary": "SUSE Bug 1041242", "url": "https://bugzilla.suse.com/1041242" }, { "category": "self", "summary": "SUSE Bug 1041431", "url": "https://bugzilla.suse.com/1041431" }, { "category": "self", "summary": "SUSE Bug 1041810", "url": "https://bugzilla.suse.com/1041810" }, { "category": "self", "summary": "SUSE Bug 1042200", "url": "https://bugzilla.suse.com/1042200" }, { "category": "self", "summary": "SUSE Bug 1042286", "url": "https://bugzilla.suse.com/1042286" }, { "category": "self", "summary": "SUSE Bug 1042356", "url": "https://bugzilla.suse.com/1042356" }, { "category": "self", "summary": "SUSE Bug 1042421", "url": "https://bugzilla.suse.com/1042421" }, { "category": "self", "summary": "SUSE Bug 1042517", "url": "https://bugzilla.suse.com/1042517" }, { "category": "self", "summary": "SUSE Bug 1042535", "url": "https://bugzilla.suse.com/1042535" }, { "category": "self", "summary": "SUSE Bug 1042536", "url": "https://bugzilla.suse.com/1042536" }, { "category": "self", "summary": "SUSE Bug 1042863", "url": "https://bugzilla.suse.com/1042863" }, { "category": "self", "summary": "SUSE Bug 1042886", "url": "https://bugzilla.suse.com/1042886" }, { "category": "self", "summary": "SUSE Bug 1043014", "url": "https://bugzilla.suse.com/1043014" }, { "category": "self", "summary": "SUSE Bug 1043231", "url": "https://bugzilla.suse.com/1043231" }, { "category": "self", "summary": "SUSE Bug 1043236", "url": "https://bugzilla.suse.com/1043236" }, { "category": "self", "summary": "SUSE Bug 1043347", "url": "https://bugzilla.suse.com/1043347" }, { "category": "self", "summary": "SUSE Bug 1043371", "url": "https://bugzilla.suse.com/1043371" }, { "category": "self", "summary": "SUSE Bug 1043467", "url": "https://bugzilla.suse.com/1043467" }, { "category": "self", "summary": "SUSE Bug 1043488", "url": "https://bugzilla.suse.com/1043488" }, { "category": "self", "summary": "SUSE Bug 1043598", "url": "https://bugzilla.suse.com/1043598" }, { "category": "self", "summary": "SUSE Bug 1043912", "url": "https://bugzilla.suse.com/1043912" }, { "category": "self", "summary": "SUSE Bug 1043935", "url": "https://bugzilla.suse.com/1043935" }, { "category": "self", "summary": "SUSE Bug 1043990", "url": "https://bugzilla.suse.com/1043990" }, { "category": "self", "summary": "SUSE Bug 1044015", "url": "https://bugzilla.suse.com/1044015" }, { "category": "self", "summary": "SUSE Bug 1044082", "url": "https://bugzilla.suse.com/1044082" }, { "category": "self", "summary": "SUSE Bug 1044120", "url": "https://bugzilla.suse.com/1044120" }, { "category": "self", "summary": "SUSE Bug 1044125", "url": "https://bugzilla.suse.com/1044125" }, { "category": "self", "summary": "SUSE Bug 1044532", "url": "https://bugzilla.suse.com/1044532" }, { "category": "self", "summary": "SUSE Bug 1044767", "url": "https://bugzilla.suse.com/1044767" }, { "category": "self", "summary": "SUSE Bug 1044772", "url": "https://bugzilla.suse.com/1044772" }, { "category": "self", "summary": "SUSE Bug 1044854", "url": "https://bugzilla.suse.com/1044854" }, { "category": "self", "summary": "SUSE Bug 1044880", "url": "https://bugzilla.suse.com/1044880" }, { "category": "self", "summary": "SUSE Bug 1044912", "url": "https://bugzilla.suse.com/1044912" }, { "category": "self", "summary": "SUSE Bug 1045154", "url": "https://bugzilla.suse.com/1045154" }, { "category": "self", "summary": "SUSE Bug 1045235", "url": "https://bugzilla.suse.com/1045235" }, { "category": "self", "summary": "SUSE Bug 1045286", "url": "https://bugzilla.suse.com/1045286" }, { "category": "self", "summary": "SUSE Bug 1045307", "url": "https://bugzilla.suse.com/1045307" }, { "category": "self", "summary": "SUSE Bug 1045340", "url": "https://bugzilla.suse.com/1045340" }, { "category": "self", "summary": "SUSE Bug 1045467", "url": "https://bugzilla.suse.com/1045467" }, { "category": "self", "summary": "SUSE Bug 1045568", "url": "https://bugzilla.suse.com/1045568" }, { "category": "self", "summary": "SUSE Bug 1046105", "url": "https://bugzilla.suse.com/1046105" }, { "category": "self", "summary": "SUSE Bug 1046434", "url": "https://bugzilla.suse.com/1046434" }, { "category": "self", "summary": "SUSE Bug 1046589", "url": "https://bugzilla.suse.com/1046589" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 863764", "url": "https://bugzilla.suse.com/863764" }, { "category": "self", "summary": "SUSE Bug 870618", "url": "https://bugzilla.suse.com/870618" }, { "category": "self", "summary": "SUSE Bug 922871", "url": "https://bugzilla.suse.com/922871" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 966170", "url": "https://bugzilla.suse.com/966170" }, { "category": "self", "summary": "SUSE Bug 966172", "url": "https://bugzilla.suse.com/966172" }, { "category": "self", "summary": "SUSE Bug 966191", "url": "https://bugzilla.suse.com/966191" }, { "category": "self", "summary": "SUSE Bug 966321", "url": "https://bugzilla.suse.com/966321" }, { "category": "self", "summary": "SUSE Bug 966339", "url": "https://bugzilla.suse.com/966339" }, { "category": "self", "summary": "SUSE Bug 968697", "url": "https://bugzilla.suse.com/968697" }, { "category": "self", "summary": "SUSE Bug 969479", "url": "https://bugzilla.suse.com/969479" }, { "category": "self", "summary": "SUSE Bug 969755", "url": "https://bugzilla.suse.com/969755" }, { "category": "self", "summary": "SUSE Bug 970083", "url": "https://bugzilla.suse.com/970083" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 985561", "url": "https://bugzilla.suse.com/985561" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987576", "url": "https://bugzilla.suse.com/987576" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989056", "url": "https://bugzilla.suse.com/989056" }, { "category": "self", "summary": "SUSE Bug 989311", "url": "https://bugzilla.suse.com/989311" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE Bug 990682", "url": "https://bugzilla.suse.com/990682" }, { "category": "self", "summary": "SUSE Bug 991273", "url": "https://bugzilla.suse.com/991273" }, { "category": "self", "summary": "SUSE Bug 993832", "url": "https://bugzilla.suse.com/993832" }, { "category": "self", "summary": "SUSE Bug 995542", "url": "https://bugzilla.suse.com/995542" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 998106", "url": "https://bugzilla.suse.com/998106" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10200 page", "url": "https://www.suse.com/security/cve/CVE-2016-10200/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2117 page", "url": "https://www.suse.com/security/cve/CVE-2016-2117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9191 page", "url": "https://www.suse.com/security/cve/CVE-2016-9191/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000364 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000364/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000365 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000365/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000380 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000380/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2583 page", "url": "https://www.suse.com/security/cve/CVE-2017-2583/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2584 page", "url": "https://www.suse.com/security/cve/CVE-2017-2584/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2596 page", "url": "https://www.suse.com/security/cve/CVE-2017-2596/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2636 page", "url": "https://www.suse.com/security/cve/CVE-2017-2636/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-2671 page", "url": "https://www.suse.com/security/cve/CVE-2017-2671/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5576 page", "url": "https://www.suse.com/security/cve/CVE-2017-5576/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5577 page", "url": "https://www.suse.com/security/cve/CVE-2017-5577/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5897 page", "url": "https://www.suse.com/security/cve/CVE-2017-5897/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5970 page", "url": "https://www.suse.com/security/cve/CVE-2017-5970/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5986 page", "url": "https://www.suse.com/security/cve/CVE-2017-5986/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6074 page", "url": "https://www.suse.com/security/cve/CVE-2017-6074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6214 page", "url": "https://www.suse.com/security/cve/CVE-2017-6214/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6345 page", "url": "https://www.suse.com/security/cve/CVE-2017-6345/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6346 page", "url": "https://www.suse.com/security/cve/CVE-2017-6346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6347 page", "url": "https://www.suse.com/security/cve/CVE-2017-6347/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-6353 page", "url": "https://www.suse.com/security/cve/CVE-2017-6353/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7184 page", "url": "https://www.suse.com/security/cve/CVE-2017-7184/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7187 page", "url": "https://www.suse.com/security/cve/CVE-2017-7187/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7261 page", "url": "https://www.suse.com/security/cve/CVE-2017-7261/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7294 page", "url": "https://www.suse.com/security/cve/CVE-2017-7294/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7308 page", "url": "https://www.suse.com/security/cve/CVE-2017-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7346 page", "url": "https://www.suse.com/security/cve/CVE-2017-7346/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7374 page", "url": "https://www.suse.com/security/cve/CVE-2017-7374/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7487 page", "url": "https://www.suse.com/security/cve/CVE-2017-7487/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7616 page", "url": "https://www.suse.com/security/cve/CVE-2017-7616/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7618 page", "url": "https://www.suse.com/security/cve/CVE-2017-7618/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-8890 page", "url": "https://www.suse.com/security/cve/CVE-2017-8890/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9074 page", "url": "https://www.suse.com/security/cve/CVE-2017-9074/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9075 page", "url": "https://www.suse.com/security/cve/CVE-2017-9075/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9076 page", "url": "https://www.suse.com/security/cve/CVE-2017-9076/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9077 page", "url": "https://www.suse.com/security/cve/CVE-2017-9077/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9150 page", "url": "https://www.suse.com/security/cve/CVE-2017-9150/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-9242 page", "url": "https://www.suse.com/security/cve/CVE-2017-9242/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-07-28T08:44:16Z", "generator": { "date": "2017-07-28T08:44:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:1990-1", "initial_release_date": "2017-07-28T08:44:16Z", "revision_history": [ { "date": "2017-07-28T08:44:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.74-7.10.1.noarch", "product": { "name": "kernel-devel-rt-4.4.74-7.10.1.noarch", "product_id": "kernel-devel-rt-4.4.74-7.10.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.74-7.10.1.noarch", "product": { "name": "kernel-source-rt-4.4.74-7.10.1.noarch", "product_id": "kernel-source-rt-4.4.74-7.10.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "product": { "name": "cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "product_id": "cluster-network-kmp-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.74-7.10.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.74-7.10.1.x86_64", "product_id": "dlm-kmp-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.74-7.10.1.x86_64", "product": { "name": "kernel-rt-4.4.74-7.10.1.x86_64", "product_id": "kernel-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.74-7.10.1.x86_64", "product": { "name": "kernel-rt-base-4.4.74-7.10.1.x86_64", "product_id": "kernel-rt-base-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.74-7.10.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.74-7.10.1.x86_64", "product_id": "kernel-rt-devel-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.74-7.10.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.74-7.10.1.x86_64", "product_id": "kernel-syms-rt-4.4.74-7.10.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.74-7.10.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.74-7.10.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP2", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.74-7.10.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.74-7.10.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "kernel-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.74-7.10.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch" }, "product_reference": "kernel-source-rt-4.4.74-7.10.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.74-7.10.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP2", "product_id": "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.74-7.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10200", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10200" } ], "notes": [ { "category": "general", "text": "Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10200", "url": "https://www.suse.com/security/cve/CVE-2016-10200" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1028415 for CVE-2016-10200", "url": "https://bugzilla.suse.com/1028415" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2016-10200" }, { "cve": "CVE-2016-2117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2117" } ], "notes": [ { "category": "general", "text": "The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2117", "url": "https://www.suse.com/security/cve/CVE-2016-2117" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-2117", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 968697 for CVE-2016-2117", "url": "https://bugzilla.suse.com/968697" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2016-2117" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-9191", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9191" } ], "notes": [ { "category": "general", "text": "The cgroup offline implementation in the Linux kernel through 4.8.11 mishandles certain drain operations, which allows local users to cause a denial of service (system hang) by leveraging access to a container environment for executing a crafted application, as demonstrated by trinity.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9191", "url": "https://www.suse.com/security/cve/CVE-2016-9191" }, { "category": "external", "summary": "SUSE Bug 1008842 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1008842" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2016-9191", "url": "https://bugzilla.suse.com/1027179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2016-9191" }, { "cve": "CVE-2017-1000364", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000364" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the size of the stack guard page on Linux, specifically a 4k stack guard page is not sufficiently large and can be \"jumped\" over (the stack guard page is bypassed), this affects Linux Kernel versions 4.11.5 and earlier (the stackguard page was introduced in 2010).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000364", "url": "https://www.suse.com/security/cve/CVE-2017-1000364" }, { "category": "external", "summary": "SUSE Bug 1039346 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1039346" }, { "category": "external", "summary": "SUSE Bug 1039348 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1039348" }, { "category": "external", "summary": "SUSE Bug 1042200 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1042200" }, { "category": "external", "summary": "SUSE Bug 1044985 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1044985" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1071943" }, { "category": "external", "summary": "SUSE Bug 1075506 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1075506" }, { "category": "external", "summary": "SUSE Bug 1077345 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1077345" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2017-1000364", "url": "https://bugzilla.suse.com/1149726" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-1000364" }, { "cve": "CVE-2017-1000365", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000365" } ], "notes": [ { "category": "general", "text": "The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIM_INFINITY (1/4 of the size), but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. This affects Linux Kernel versions 4.11.5 and earlier. It appears that this feature was introduced in the Linux Kernel version 2.6.23.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000365", "url": "https://www.suse.com/security/cve/CVE-2017-1000365" }, { "category": "external", "summary": "SUSE Bug 1037551 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1037551" }, { "category": "external", "summary": "SUSE Bug 1039346 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039346" }, { "category": "external", "summary": "SUSE Bug 1039349 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039349" }, { "category": "external", "summary": "SUSE Bug 1039354 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1039354" }, { "category": "external", "summary": "SUSE Bug 1054557 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1054557" }, { "category": "external", "summary": "SUSE Bug 1077345 for CVE-2017-1000365", "url": "https://bugzilla.suse.com/1077345" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.9, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-1000365" }, { "cve": "CVE-2017-1000380", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000380" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel before 4.11.5 is vulnerable to a data race in the ALSA /dev/snd/timer driver resulting in local users being able to read information belonging to other users, i.e., uninitialized memory contents may be disclosed when a read and an ioctl happen at the same time.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000380", "url": "https://www.suse.com/security/cve/CVE-2017-1000380" }, { "category": "external", "summary": "SUSE Bug 1044125 for CVE-2017-1000380", "url": "https://bugzilla.suse.com/1044125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-1000380" }, { "cve": "CVE-2017-2583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2583" } ], "notes": [ { "category": "general", "text": "The load_segment_descriptor implementation in arch/x86/kvm/emulate.c in the Linux kernel before 4.9.5 improperly emulates a \"MOV SS, NULL selector\" instruction, which allows guest OS users to cause a denial of service (guest OS crash) or gain guest OS privileges via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2583", "url": "https://www.suse.com/security/cve/CVE-2017-2583" }, { "category": "external", "summary": "SUSE Bug 1020602 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1020602" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2583", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-2583" }, { "cve": "CVE-2017-2584", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2584" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel through 4.9.3 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free) via a crafted application that leverages instruction emulation for fxrstor, fxsave, sgdt, and sidt.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2584", "url": "https://www.suse.com/security/cve/CVE-2017-2584" }, { "category": "external", "summary": "SUSE Bug 1019851 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1019851" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2584", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-2584" }, { "cve": "CVE-2017-2596", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2596" } ], "notes": [ { "category": "general", "text": "The nested_vmx_check_vmptr function in arch/x86/kvm/vmx.c in the Linux kernel through 4.9.8 improperly emulates the VMXON instruction, which allows KVM L1 guest OS users to cause a denial of service (host OS memory consumption) by leveraging the mishandling of page references.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2596", "url": "https://www.suse.com/security/cve/CVE-2017-2596" }, { "category": "external", "summary": "SUSE Bug 1022785 for CVE-2017-2596", "url": "https://bugzilla.suse.com/1022785" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2596", "url": "https://bugzilla.suse.com/1027179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-2596" }, { "cve": "CVE-2017-2636", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2636" } ], "notes": [ { "category": "general", "text": "Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2636", "url": "https://www.suse.com/security/cve/CVE-2017-2636" }, { "category": "external", "summary": "SUSE Bug 1027565 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027565" }, { "category": "external", "summary": "SUSE Bug 1027575 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1027575" }, { "category": "external", "summary": "SUSE Bug 1028372 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1028372" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-2636", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-2636" }, { "cve": "CVE-2017-2671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-2671" } ], "notes": [ { "category": "general", "text": "The ping_unhash function in net/ipv4/ping.c in the Linux kernel through 4.10.8 is too late in obtaining a certain lock and consequently cannot ensure that disconnect function calls are safe, which allows local users to cause a denial of service (panic) by leveraging access to the protocol value of IPPROTO_ICMP in a socket system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-2671", "url": "https://www.suse.com/security/cve/CVE-2017-2671" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031003 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1031003" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-2671", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-2671" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-5551" }, { "cve": "CVE-2017-5576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5576" } ], "notes": [ { "category": "general", "text": "Integer overflow in the vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted size value in a VC4_SUBMIT_CL ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5576", "url": "https://www.suse.com/security/cve/CVE-2017-5576" }, { "category": "external", "summary": "SUSE Bug 1021294 for CVE-2017-5576", "url": "https://bugzilla.suse.com/1021294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-5576" }, { "cve": "CVE-2017-5577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5577" } ], "notes": [ { "category": "general", "text": "The vc4_get_bcl function in drivers/gpu/drm/vc4/vc4_gem.c in the VideoCore DRM driver in the Linux kernel before 4.9.7 does not set an errno value upon certain overflow detections, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) via inconsistent size values in a VC4_SUBMIT_CL ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5577", "url": "https://www.suse.com/security/cve/CVE-2017-5577" }, { "category": "external", "summary": "SUSE Bug 1021294 for CVE-2017-5577", "url": "https://bugzilla.suse.com/1021294" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-5577" }, { "cve": "CVE-2017-5897", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5897" } ], "notes": [ { "category": "general", "text": "The ip6gre_err function in net/ipv6/ip6_gre.c in the Linux kernel allows remote attackers to have unspecified impact via vectors involving GRE flags in an IPv6 packet, which trigger an out-of-bounds access.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5897", "url": "https://www.suse.com/security/cve/CVE-2017-5897" }, { "category": "external", "summary": "SUSE Bug 1023762 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1023762" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-5897", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-5897" }, { "cve": "CVE-2017-5970", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5970" } ], "notes": [ { "category": "general", "text": "The ipv4_pktinfo_prepare function in net/ipv4/ip_sockglue.c in the Linux kernel through 4.9.9 allows attackers to cause a denial of service (system crash) via (1) an application that makes crafted system calls or possibly (2) IPv4 traffic with invalid IP options.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5970", "url": "https://www.suse.com/security/cve/CVE-2017-5970" }, { "category": "external", "summary": "SUSE Bug 1024938 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1024938" }, { "category": "external", "summary": "SUSE Bug 1025013 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1025013" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-5970", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-5970" }, { "cve": "CVE-2017-5986", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5986" } ], "notes": [ { "category": "general", "text": "Race condition in the sctp_wait_for_sndbuf function in net/sctp/socket.c in the Linux kernel before 4.9.11 allows local users to cause a denial of service (assertion failure and panic) via a multithreaded application that peels off an association in a certain buffer-full state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5986", "url": "https://www.suse.com/security/cve/CVE-2017-5986" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-5986", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-5986" }, { "cve": "CVE-2017-6074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6074" } ], "notes": [ { "category": "general", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Linux kernel through 4.9.11 mishandles DCCP_PKT_REQUEST packet data structures in the LISTEN state, which allows local users to obtain root privileges or cause a denial of service (double free) via an application that makes an IPV6_RECVPKTINFO setsockopt system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6074", "url": "https://www.suse.com/security/cve/CVE-2017-6074" }, { "category": "external", "summary": "SUSE Bug 1026024 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1026024" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-6074", "url": "https://bugzilla.suse.com/1072204" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-6074" }, { "cve": "CVE-2017-6214", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6214" } ], "notes": [ { "category": "general", "text": "The tcp_splice_read function in net/ipv4/tcp.c in the Linux kernel before 4.9.11 allows remote attackers to cause a denial of service (infinite loop and soft lockup) via vectors involving a TCP packet with the URG flag.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6214", "url": "https://www.suse.com/security/cve/CVE-2017-6214" }, { "category": "external", "summary": "SUSE Bug 1026722 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1026722" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-6214", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-6214" }, { "cve": "CVE-2017-6345", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6345" } ], "notes": [ { "category": "general", "text": "The LLC subsystem in the Linux kernel before 4.9.13 does not ensure that a certain destructor exists in required circumstances, which allows local users to cause a denial of service (BUG_ON) or possibly have unspecified other impact via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6345", "url": "https://www.suse.com/security/cve/CVE-2017-6345" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027190 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1027190" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-6345", "url": "https://bugzilla.suse.com/1087082" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-6345" }, { "cve": "CVE-2017-6346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6346" } ], "notes": [ { "category": "general", "text": "Race condition in net/packet/af_packet.c in the Linux kernel before 4.9.13 allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a multithreaded application that makes PACKET_FANOUT setsockopt system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6346", "url": "https://www.suse.com/security/cve/CVE-2017-6346" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1027189 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1027189" }, { "category": "external", "summary": "SUSE Bug 1064388 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064388" }, { "category": "external", "summary": "SUSE Bug 1064392 for CVE-2017-6346", "url": "https://bugzilla.suse.com/1064392" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-6346" }, { "cve": "CVE-2017-6347", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6347" } ], "notes": [ { "category": "general", "text": "The ip_cmsg_recv_checksum function in net/ipv4/ip_sockglue.c in the Linux kernel before 4.10.1 has incorrect expectations about skb data layout, which allows local users to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted system calls, as demonstrated by use of the MSG_MORE flag in conjunction with loopback UDP transmission.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6347", "url": "https://www.suse.com/security/cve/CVE-2017-6347" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-6347", "url": "https://bugzilla.suse.com/1027179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-6347" }, { "cve": "CVE-2017-6353", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-6353" } ], "notes": [ { "category": "general", "text": "net/sctp/socket.c in the Linux kernel through 4.10.1 does not properly restrict association peel-off operations during certain wait states, which allows local users to cause a denial of service (invalid unlock and double free) via a multithreaded application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2017-5986.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-6353", "url": "https://www.suse.com/security/cve/CVE-2017-6353" }, { "category": "external", "summary": "SUSE Bug 1025235 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1025235" }, { "category": "external", "summary": "SUSE Bug 1027066 for CVE-2017-6353", "url": "https://bugzilla.suse.com/1027066" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-6353" }, { "cve": "CVE-2017-7184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7184" } ], "notes": [ { "category": "general", "text": "The xfrm_replay_verify_len function in net/xfrm/xfrm_user.c in the Linux kernel through 4.10.6 does not validate certain size data after an XFRM_MSG_NEWAE update, which allows local users to obtain root privileges or cause a denial of service (heap-based out-of-bounds access) by leveraging the CAP_NET_ADMIN capability, as demonstrated during a Pwn2Own competition at CanSecWest 2017 for the Ubuntu 16.10 linux-image-* package 4.8.0.41.52.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7184", "url": "https://www.suse.com/security/cve/CVE-2017-7184" }, { "category": "external", "summary": "SUSE Bug 1030573 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1030573" }, { "category": "external", "summary": "SUSE Bug 1030575 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1030575" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7184", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7184" }, { "cve": "CVE-2017-7187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7187" } ], "notes": [ { "category": "general", "text": "The sg_ioctl function in drivers/scsi/sg.c in the Linux kernel through 4.10.4 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a large command size in an SG_NEXT_CMD_LEN ioctl call, leading to out-of-bounds write access in the sg_write function.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7187", "url": "https://www.suse.com/security/cve/CVE-2017-7187" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1030213 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1030213" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7187", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7187" }, { "cve": "CVE-2017-7261", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7261" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.5 does not check for a zero value of certain levels data, which allows local users to cause a denial of service (ZERO_SIZE_PTR dereference, and GPF and possibly panic) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7261", "url": "https://www.suse.com/security/cve/CVE-2017-7261" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031052 for CVE-2017-7261", "url": "https://bugzilla.suse.com/1031052" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7261" }, { "cve": "CVE-2017-7294", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7294" } ], "notes": [ { "category": "general", "text": "The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7294", "url": "https://www.suse.com/security/cve/CVE-2017-7294" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031440 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031440" }, { "category": "external", "summary": "SUSE Bug 1031481 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1031481" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7294", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7294" }, { "cve": "CVE-2017-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7308" } ], "notes": [ { "category": "general", "text": "The packet_set_ring function in net/packet/af_packet.c in the Linux kernel through 4.10.6 does not properly validate certain block-size data, which allows local users to cause a denial of service (integer signedness error and out-of-bounds write), or gain privileges (if the CAP_NET_RAW capability is held), via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7308", "url": "https://www.suse.com/security/cve/CVE-2017-7308" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1031579 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031579" }, { "category": "external", "summary": "SUSE Bug 1031660 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1031660" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7308", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7308" }, { "cve": "CVE-2017-7346", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7346" } ], "notes": [ { "category": "general", "text": "The vmw_gb_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.7 does not validate certain levels data, which allows local users to cause a denial of service (system hang) via a crafted ioctl call for a /dev/dri/renderD* device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7346", "url": "https://www.suse.com/security/cve/CVE-2017-7346" }, { "category": "external", "summary": "SUSE Bug 1031796 for CVE-2017-7346", "url": "https://bugzilla.suse.com/1031796" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7346" }, { "cve": "CVE-2017-7374", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7374" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in fs/crypto/ in the Linux kernel before 4.10.7 allows local users to cause a denial of service (NULL pointer dereference) or possibly gain privileges by revoking keyring keys being used for ext4, f2fs, or ubifs encryption, causing cryptographic transform objects to be freed prematurely.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7374", "url": "https://www.suse.com/security/cve/CVE-2017-7374" }, { "category": "external", "summary": "SUSE Bug 1027179 for CVE-2017-7374", "url": "https://bugzilla.suse.com/1027179" }, { "category": "external", "summary": "SUSE Bug 1032006 for CVE-2017-7374", "url": "https://bugzilla.suse.com/1032006" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7374" }, { "cve": "CVE-2017-7487", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7487" } ], "notes": [ { "category": "general", "text": "The ipxitf_ioctl function in net/ipx/af_ipx.c in the Linux kernel through 4.11.1 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a failed SIOCGIFADDR ioctl call for an IPX interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7487", "url": "https://www.suse.com/security/cve/CVE-2017-7487" }, { "category": "external", "summary": "SUSE Bug 1038879 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038879" }, { "category": "external", "summary": "SUSE Bug 1038883 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038883" }, { "category": "external", "summary": "SUSE Bug 1038981 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038981" }, { "category": "external", "summary": "SUSE Bug 1038982 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1038982" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-7487", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2017-7487", "url": "https://bugzilla.suse.com/870618" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7487" }, { "cve": "CVE-2017-7616", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7616" } ], "notes": [ { "category": "general", "text": "Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7616", "url": "https://www.suse.com/security/cve/CVE-2017-7616" }, { "category": "external", "summary": "SUSE Bug 1033336 for CVE-2017-7616", "url": "https://bugzilla.suse.com/1033336" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-7616" }, { "cve": "CVE-2017-7618", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7618" } ], "notes": [ { "category": "general", "text": "crypto/ahash.c in the Linux kernel through 4.10.9 allows attackers to cause a denial of service (API operation calling its own callback, and infinite recursion) by triggering EBUSY on a full queue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7618", "url": "https://www.suse.com/security/cve/CVE-2017-7618" }, { "category": "external", "summary": "SUSE Bug 1033340 for CVE-2017-7618", "url": "https://bugzilla.suse.com/1033340" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-7618" }, { "cve": "CVE-2017-8890", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-8890" } ], "notes": [ { "category": "general", "text": "The inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c in the Linux kernel through 4.10.15 allows attackers to cause a denial of service (double free) or possibly have unspecified other impact by leveraging use of the accept system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-8890", "url": "https://www.suse.com/security/cve/CVE-2017-8890" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1038564 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1038564" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-8890", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-8890" }, { "cve": "CVE-2017-9074", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9074" } ], "notes": [ { "category": "general", "text": "The IPv6 fragmentation implementation in the Linux kernel through 4.11.1 does not consider that the nexthdr field may be associated with an invalid option, which allows local users to cause a denial of service (out-of-bounds read and BUG) or possibly have unspecified other impact via crafted socket and send system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9074", "url": "https://www.suse.com/security/cve/CVE-2017-9074" }, { "category": "external", "summary": "SUSE Bug 1039882 for CVE-2017-9074", "url": "https://bugzilla.suse.com/1039882" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9074", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-9074" }, { "cve": "CVE-2017-9075", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9075" } ], "notes": [ { "category": "general", "text": "The sctp_v6_create_accept_sk function in net/sctp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9075", "url": "https://www.suse.com/security/cve/CVE-2017-9075" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1039883 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1039883" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9075", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-9075" }, { "cve": "CVE-2017-9076", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9076" } ], "notes": [ { "category": "general", "text": "The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9076", "url": "https://www.suse.com/security/cve/CVE-2017-9076" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1039885 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1039885" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1051906 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1051906" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9076", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-9076" }, { "cve": "CVE-2017-9077", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9077" } ], "notes": [ { "category": "general", "text": "The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9077", "url": "https://www.suse.com/security/cve/CVE-2017-9077" }, { "category": "external", "summary": "SUSE Bug 1038544 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1038544" }, { "category": "external", "summary": "SUSE Bug 1040069 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1040069" }, { "category": "external", "summary": "SUSE Bug 1042364 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1042364" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2017-9077", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "moderate" } ], "title": "CVE-2017-9077" }, { "cve": "CVE-2017-9150", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9150" } ], "notes": [ { "category": "general", "text": "The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9150", "url": "https://www.suse.com/security/cve/CVE-2017-9150" }, { "category": "external", "summary": "SUSE Bug 1040279 for CVE-2017-9150", "url": "https://bugzilla.suse.com/1040279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "low" } ], "title": "CVE-2017-9150" }, { "cve": "CVE-2017-9242", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-9242" } ], "notes": [ { "category": "general", "text": "The __ip6_append_data function in net/ipv6/ip6_output.c in the Linux kernel through 4.11.3 is too late in checking whether an overwrite of an skb data structure may occur, which allows local users to cause a denial of service (system crash) via crafted system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-9242", "url": "https://www.suse.com/security/cve/CVE-2017-9242" }, { "category": "external", "summary": "SUSE Bug 1041431 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1041431" }, { "category": "external", "summary": "SUSE Bug 1042892 for CVE-2017-9242", "url": "https://bugzilla.suse.com/1042892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP2:cluster-md-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:cluster-network-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:dlm-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:gfs2-kmp-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-devel-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-base-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-rt_debug-devel-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:kernel-source-rt-4.4.74-7.10.1.noarch", "SUSE Linux Enterprise Real Time 12 SP2:kernel-syms-rt-4.4.74-7.10.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP2:ocfs2-kmp-rt-4.4.74-7.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-07-28T08:44:16Z", "details": "important" } ], "title": "CVE-2017-9242" } ] }
suse-su-2016:2105-1
Vulnerability from csaf_suse
Published
2016-08-19 08:48
Modified
2016-08-19 08:48
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka 'Linux pciback missing sanity checks (bnc#957990).
- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983143).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bsc#978401).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bsc#979213).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction an exec system call (bsc#986569).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- Add wait_event_cmd() (bsc#953048).
- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).
- Btrfs: do not use src fd for printk (bsc#980348).
- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).
- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).
- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).
- Disable btrfs patch (bsc#981597)
- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).
- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).
- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).
- EDAC/sb_edac: Fix computation of channel address (bsc#979521).
- EDAC: Correct channel count limit (bsc#979521).
- EDAC: Remove arbitrary limit on number of channels (bsc#979521).
- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).
- RAID5: batch adjacent full stripe write (bsc#953048).
- RAID5: check_reshape() shouldn't call mddev_suspend (bsc#953048).
- RAID5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).
- Restore copying of SKBs with head exceeding page size (bsc#978469).
- SCSI: Increase REPORT_LUNS timeout (bsc#982282).
- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).
- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.
- VSOCK: Fix lockdep issue (bsc#977417).
- VSOCK: sock_put wasn't safe to call in interrupt context (bsc#977417).
- base: make module_create_drivers_dir race-free (bnc#983977).
- cdc_ncm: workaround for EM7455 'silent' data interface (bnc#988552).
- ceph: tolerate bad i_size for symlink inode (bsc#985232).
- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).
- drm/mgag200: Add support for a new rev of G200e (bsc#983904).
- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).
- drm/mgag200: remove unused variables (bsc#983904).
- drm: qxl: Workaround for buggy user-space (bsc#981344).
- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).
- efifb: Fix 16 color palette entry calculation (bsc#983318).
- efifb: Fix KABI of screen_info struct (bsc#973499).
- ehci-pci: enable interrupt on BayTrail (bnc#947337).
- enic: set netdev->vlan_features (bsc#966245).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid-elo: kill not flush the work (bnc#982354).
- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736)
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- kvm: Guest does not show the cpu flag nonstop_tsc (bsc#971770)
- md/raid56: Do not perform reads to support writes until stripe is ready.
- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).
- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.
- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).
- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).
- md/raid5: always set conf->prev_chunk_sectors and ->prev_algo (bsc#953048).
- md/raid5: avoid races when changing cache size (bsc#953048).
- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).
- md/raid5: be more selective about distributing flags across batch (bsc#953048).
- md/raid5: break stripe-batches when the array has failed (bsc#953048).
- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).
- md/raid5: change ->inactive_blocked to a bit-flag (bsc#953048).
- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).
- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).
- md/raid5: close recently introduced race in stripe_head management.
- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).
- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).
- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).
- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).
- md/raid5: do not let shrink_slab shrink too far (bsc#953048).
- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).
- md/raid5: ensure device failure recorded before write request returns (bsc#953048).
- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).
- md/raid5: fix allocation of 'scribble' array (bsc#953048).
- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).
- md/raid5: fix handling of degraded stripes in batches (bsc#953048).
- md/raid5: fix init_stripe() inconsistencies (bsc#953048).
- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).
- md/raid5: fix newly-broken locking in get_active_stripe.
- md/raid5: handle possible race as reshape completes (bsc#953048).
- md/raid5: ignore released_stripes check (bsc#953048).
- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).
- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).
- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).
- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).
- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).
- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).
- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).
- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.
- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).
- md/raid5: remove incorrect 'min_t()' when calculating writepos (bsc#953048).
- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).
- md/raid5: separate large if clause out of fetch_block() (bsc#953048).
- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).
- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).
- md/raid5: strengthen check on reshape_position at run (bsc#953048).
- md/raid5: switch to use conf->chunk_sectors in place of mddev->chunk_sectors where possible (bsc#953048).
- md/raid5: use ->lock to protect accessing raid5 sysfs attributes (bsc#953048).
- md/raid5: use bio_list for the list of bios to return (bsc#953048).
- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).
- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).
- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).
- md: remove unwanted white space from md.c (bsc#953048).
- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).
- net: Start with correct mac_len in skb_network_protocol (bsc#968667).
- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).
- net: fix wrong mac_len calculation for vlans (bsc#968667).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: don't poll the CQ from the kthread (bsc#975788, bsc#965087).
- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).
- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).
- raid5: Retry R5_ReadNoMerge flag when hit a read error.
- raid5: add a new flag to track if a stripe can be batched (bsc#953048).
- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).
- raid5: avoid release list until last reference of the stripe (bsc#953048).
- raid5: check faulty flag for array status during recovery (bsc#953048).
- raid5: fix a race of stripe count check.
- raid5: fix broken async operation chain (bsc#953048).
- raid5: get_active_stripe avoids device_lock.
- raid5: handle expansion/resync case with stripe batching (bsc#953048).
- raid5: handle io error of batch list (bsc#953048).
- raid5: make_request does less prepare wait.
- raid5: relieve lock contention in get_active_stripe().
- raid5: relieve lock contention in get_active_stripe().
- raid5: speedup sync_request processing (bsc#953048).
- raid5: track overwrite disk count (bsc#953048).
- raid5: update analysis state for failed stripe (bsc#953048).
- raid5: use flex_array for scribble data (bsc#953048).
- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).
- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).
- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).
- s390/3270: fix view reference counting (bnc#979922, LTC#141736).
- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).
- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).
- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).
- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).
- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).
- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).
- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).
- sb_edac: support for Broadwell -EP and -EX (bsc#979521).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched/x86: Fix up typo in topology detection (bsc#974165).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).
- wait: introduce wait_event_exclusive_cmd (bsc#953048).
- x86 EDAC, sb_edac.c: Repair damage introduced when 'fixing' channel address (bsc#979521).
- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).
- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).
- x86/efi: parse_efi_setup() build fix (bsc#979485).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86: standardize mmap_rnd() usage (bnc#974308).
- xfs: fix premature enospc on inode allocation (bsc#984148).
- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).
- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1246,SUSE-SLE-Live-Patching-12-2016-1246,SUSE-SLE-Module-Public-Cloud-12-2016-1246,SUSE-SLE-SDK-12-SP1-2016-1246,SUSE-SLE-SERVER-12-SP1-2016-1246,SUSE-SLE-WE-12-SP1-2016-1246
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP1 kernel was updated to 3.12.62 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2014-9904: The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel did not properly check for an integer overflow, which allowed local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call (bnc#986811).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2015-8551: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8552: The PCI backend driver in Xen, when running on an x86 system and using Linux as the driver domain, allowed local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \u0027Linux pciback missing sanity checks (bnc#957990).\n- CVE-2015-8845: The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms did not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allowed local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application (bnc#975533).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bsc#983143).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-3672: The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel did not properly randomize the legacy base address, which made it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits (bnc#974308).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bsc#978401).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bsc#979213).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-5828: The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel on powerpc platforms mishandled transactional state, which allowed local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction an exec system call (bsc#986569).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- Add wait_event_cmd() (bsc#953048).\n- Btrfs: be more precise on errors when getting an inode from disk (bsc#981038).\n- Btrfs: do not use src fd for printk (bsc#980348).\n- Btrfs: improve performance on fsync against new inode after rename/unlink (bsc#981038).\n- Btrfs: qgroup: Fix qgroup accounting when creating snapshot (bsc#972933).\n- Btrfs: serialize subvolume mounts with potentially mismatching rw flags (bsc#951844).\n- Disable btrfs patch (bsc#981597)\n- EDAC, sb_edac: Add support for duplicate device IDs (bsc#979521).\n- EDAC, sb_edac: Fix TAD presence check for sbridge_mci_bind_devs() (bsc#979521).\n- EDAC, sb_edac: Fix rank lookup on Broadwell (bsc#979521).\n- EDAC/sb_edac: Fix computation of channel address (bsc#979521).\n- EDAC: Correct channel count limit (bsc#979521).\n- EDAC: Remove arbitrary limit on number of channels (bsc#979521).\n- EDAC: Use static attribute groups for managing sysfs entries (bsc#979521).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- PCI/AER: Clear error status registers during enumeration and restore (bsc#985978).\n- RAID5: batch adjacent full stripe write (bsc#953048).\n- RAID5: check_reshape() shouldn\u0027t call mddev_suspend (bsc#953048).\n- RAID5: revert e9e4c377e2f563 to fix a livelock (bsc#953048).\n- Restore copying of SKBs with head exceeding page size (bsc#978469).\n- SCSI: Increase REPORT_LUNS timeout (bsc#982282).\n- USB: xhci: Add broken streams quirk for Frescologic device id 1009 (bnc#982698).\n- Update patches.drivers/0001-nvme-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.drivers/nvme-0106-init-nvme-queue-before-enabling-irq.patch (bsc#962742). Fix incorrect bugzilla referece.\n- VSOCK: Fix lockdep issue (bsc#977417).\n- VSOCK: sock_put wasn\u0027t safe to call in interrupt context (bsc#977417).\n- base: make module_create_drivers_dir race-free (bnc#983977).\n- cdc_ncm: workaround for EM7455 \u0027silent\u0027 data interface (bnc#988552).\n- ceph: tolerate bad i_size for symlink inode (bsc#985232).\n- drm/mgag200: Add support for a new G200eW3 chipset (bsc#983904).\n- drm/mgag200: Add support for a new rev of G200e (bsc#983904).\n- drm/mgag200: Black screen fix for G200e rev 4 (bsc#983904).\n- drm/mgag200: remove unused variables (bsc#983904).\n- drm: qxl: Workaround for buggy user-space (bsc#981344).\n- efifb: Add support for 64-bit frame buffer addresses (bsc#973499).\n- efifb: Fix 16 color palette entry calculation (bsc#983318).\n- efifb: Fix KABI of screen_info struct (bsc#973499).\n- ehci-pci: enable interrupt on BayTrail (bnc#947337).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- hid-elo: kill not flush the work (bnc#982354).\n- iommu/vt-d: Enable QI on all IOMMUs before setting root entry (bsc#975772).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi/severities: Added raw3270_* PASS to allow IBM LTC changes (bnc#979922, LTC#141736)\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- kvm: Guest does not show the cpu flag nonstop_tsc (bsc#971770) \n- md/raid56: Do not perform reads to support writes until stripe is ready.\n- md/raid5: Ensure a batch member is not handled prematurely (bsc#953048).\n- md/raid5: For stripe with R5_ReadNoMerge, we replace REQ_FLUSH with REQ_NOMERGE.\n- md/raid5: add handle_flags arg to break_stripe_batch_list (bsc#953048).\n- md/raid5: allow the stripe_cache to grow and shrink (bsc#953048).\n- md/raid5: always set conf-\u003eprev_chunk_sectors and -\u003eprev_algo (bsc#953048).\n- md/raid5: avoid races when changing cache size (bsc#953048).\n- md/raid5: avoid reading parity blocks for full-stripe write to degraded array (bsc#953048).\n- md/raid5: be more selective about distributing flags across batch (bsc#953048).\n- md/raid5: break stripe-batches when the array has failed (bsc#953048).\n- md/raid5: call break_stripe_batch_list from handle_stripe_clean_event (bsc#953048).\n- md/raid5: change -\u003einactive_blocked to a bit-flag (bsc#953048).\n- md/raid5: clear R5_NeedReplace when no longer needed (bsc#953048).\n- md/raid5: close race between STRIPE_BIT_DELAY and batching (bsc#953048).\n- md/raid5: close recently introduced race in stripe_head management.\n- md/raid5: consider updating reshape_position at start of reshape (bsc#953048).\n- md/raid5: deadlock between retry_aligned_read with barrier io (bsc#953048).\n- md/raid5: do not do chunk aligned read on degraded array (bsc#953048).\n- md/raid5: do not index beyond end of array in need_this_block() (bsc#953048).\n- md/raid5: do not let shrink_slab shrink too far (bsc#953048).\n- md/raid5: duplicate some more handle_stripe_clean_event code in break_stripe_batch_list (bsc#953048).\n- md/raid5: ensure device failure recorded before write request returns (bsc#953048).\n- md/raid5: ensure whole batch is delayed for all required bitmap updates (bsc#953048).\n- md/raid5: fix allocation of \u0027scribble\u0027 array (bsc#953048).\n- md/raid5: fix another livelock caused by non-aligned writes (bsc#953048).\n- md/raid5: fix handling of degraded stripes in batches (bsc#953048).\n- md/raid5: fix init_stripe() inconsistencies (bsc#953048).\n- md/raid5: fix locking in handle_stripe_clean_event() (bsc#953048).\n- md/raid5: fix newly-broken locking in get_active_stripe.\n- md/raid5: handle possible race as reshape completes (bsc#953048).\n- md/raid5: ignore released_stripes check (bsc#953048).\n- md/raid5: more incorrect BUG_ON in handle_stripe_fill (bsc#953048).\n- md/raid5: move max_nr_stripes management into grow_one_stripe and drop_one_stripe (bsc#953048).\n- md/raid5: need_this_block: start simplifying the last two conditions (bsc#953048).\n- md/raid5: need_this_block: tidy/fix last condition (bsc#953048).\n- md/raid5: new alloc_stripe() to allocate an initialize a stripe (bsc#953048).\n- md/raid5: pass gfp_t arg to grow_one_stripe() (bsc#953048).\n- md/raid5: per hash value and exclusive wait_for_stripe (bsc#953048).\n- md/raid5: preserve STRIPE_PREREAD_ACTIVE in break_stripe_batch_list.\n- md/raid5: remove condition test from check_break_stripe_batch_list (bsc#953048).\n- md/raid5: remove incorrect \u0027min_t()\u0027 when calculating writepos (bsc#953048).\n- md/raid5: remove redundant check in stripe_add_to_batch_list() (bsc#953048).\n- md/raid5: separate large if clause out of fetch_block() (bsc#953048).\n- md/raid5: separate out the easy conditions in need_this_block (bsc#953048).\n- md/raid5: split wait_for_stripe and introduce wait_for_quiescent (bsc#953048).\n- md/raid5: strengthen check on reshape_position at run (bsc#953048).\n- md/raid5: switch to use conf-\u003echunk_sectors in place of mddev-\u003echunk_sectors where possible (bsc#953048).\n- md/raid5: use -\u003elock to protect accessing raid5 sysfs attributes (bsc#953048).\n- md/raid5: use bio_list for the list of bios to return (bsc#953048).\n- md: be careful when testing resync_max against curr_resync_completed (bsc#953048).\n- md: do_release_stripe(): No need to call md_wakeup_thread() twice (bsc#953048).\n- md: make sure MD_RECOVERY_DONE is clear before starting recovery/resync (bsc#953048).\n- md: remove unwanted white space from md.c (bsc#953048).\n- md: use set_bit/clear_bit instead of shift/mask for bi_flags changes (bsc#953048).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- net: Account for all vlan headers in skb_mac_gso_segment (bsc#968667).\n- net: Start with correct mac_len in skb_network_protocol (bsc#968667).\n- net: disable fragment reassembly if high_thresh is set to zero (bsc#970506).\n- net: fix wrong mac_len calculation for vlans (bsc#968667).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: don\u0027t poll the CQ from the kthread (bsc#975788, bsc#965087).\n- perf/rapl: Fix sysfs_show() initialization for RAPL PMU (bsc#979489).\n- perf/x86/intel: Add Intel RAPL PP1 energy counter support (bsc#979489).\n- ppp: defer netns reference release for ppp channel (bsc#980371). \n- qeth: delete napi struct when removing a qeth device (bnc#988215, LTC#143590).\n- raid5: Retry R5_ReadNoMerge flag when hit a read error.\n- raid5: add a new flag to track if a stripe can be batched (bsc#953048).\n- raid5: add an option to avoid copy data from bio to stripe cache (bsc#953048).\n- raid5: avoid release list until last reference of the stripe (bsc#953048).\n- raid5: check faulty flag for array status during recovery (bsc#953048).\n- raid5: fix a race of stripe count check.\n- raid5: fix broken async operation chain (bsc#953048).\n- raid5: get_active_stripe avoids device_lock.\n- raid5: handle expansion/resync case with stripe batching (bsc#953048).\n- raid5: handle io error of batch list (bsc#953048).\n- raid5: make_request does less prepare wait.\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: relieve lock contention in get_active_stripe().\n- raid5: speedup sync_request processing (bsc#953048).\n- raid5: track overwrite disk count (bsc#953048).\n- raid5: update analysis state for failed stripe (bsc#953048).\n- raid5: use flex_array for scribble data (bsc#953048).\n- s390/3270: add missing tty_kref_put (bnc#979922, LTC#141736).\n- s390/3270: avoid endless I/O loop with disconnected 3270 terminals (bnc#979922, LTC#141736).\n- s390/3270: fix garbled output on 3270 tty view (bnc#979922, LTC#141736).\n- s390/3270: fix view reference counting (bnc#979922, LTC#141736).\n- s390/3270: handle reconnect of a tty with a different size (bnc#979922, LTC#141736).\n- s390/3270: hangup the 3270 tty after a disconnect (bnc#979922, LTC#141736).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979922, LTC#141456).\n- s390/spinlock: avoid yield to non existent cpu (bnc#979922, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#988215, LTC#143138).\n- sb_edac: Fix a typo and a thinko in address handling for Haswell (bsc#979521).\n- sb_edac: Fix support for systems with two home agents per socket (bsc#979521).\n- sb_edac: correctly fetch DIMM width on Ivy Bridge and Haswell (bsc#979521).\n- sb_edac: look harder for DDRIO on Haswell systems (bsc#979521).\n- sb_edac: support for Broadwell -EP and -EX (bsc#979521).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched/x86: Fix up typo in topology detection (bsc#974165).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n- usb: quirk to stop runtime PM for Intel 7260 (bnc#984456).\n- wait: introduce wait_event_exclusive_cmd (bsc#953048).\n- x86 EDAC, sb_edac.c: Repair damage introduced when \u0027fixing\u0027 channel address (bsc#979521).\n- x86 EDAC, sb_edac.c: Take account of channel hashing when needed (bsc#979521).\n- x86, sched: Add new topology for multi-NUMA-node CPUs (bsc#974165).\n- x86/efi: parse_efi_setup() build fix (bsc#979485).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86: standardize mmap_rnd() usage (bnc#974308).\n- xfs: fix premature enospc on inode allocation (bsc#984148).\n- xfs: get rid of XFS_IALLOC_BLOCKS macros (bsc#984148).\n- xfs: get rid of XFS_INODE_CLUSTER_SIZE macros (bsc#984148).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1246,SUSE-SLE-Live-Patching-12-2016-1246,SUSE-SLE-Module-Public-Cloud-12-2016-1246,SUSE-SLE-SDK-12-SP1-2016-1246,SUSE-SLE-SERVER-12-SP1-2016-1246,SUSE-SLE-WE-12-SP1-2016-1246", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2105-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2105-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162105-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2105-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002218.html" }, { "category": "self", "summary": "SUSE Bug 947337", "url": "https://bugzilla.suse.com/947337" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 951844", "url": "https://bugzilla.suse.com/951844" }, { "category": "self", "summary": "SUSE Bug 953048", "url": "https://bugzilla.suse.com/953048" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957990", "url": "https://bugzilla.suse.com/957990" }, { "category": "self", "summary": "SUSE Bug 962742", "url": "https://bugzilla.suse.com/962742" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 965087", "url": "https://bugzilla.suse.com/965087" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 968667", "url": "https://bugzilla.suse.com/968667" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 970506", "url": "https://bugzilla.suse.com/970506" }, { "category": "self", "summary": "SUSE Bug 971770", "url": "https://bugzilla.suse.com/971770" }, { "category": "self", "summary": "SUSE Bug 972933", "url": "https://bugzilla.suse.com/972933" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 973499", "url": "https://bugzilla.suse.com/973499" }, { "category": "self", "summary": "SUSE Bug 974165", "url": "https://bugzilla.suse.com/974165" }, { "category": "self", "summary": "SUSE Bug 974308", "url": "https://bugzilla.suse.com/974308" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975531", "url": "https://bugzilla.suse.com/975531" }, { "category": "self", "summary": "SUSE Bug 975533", "url": "https://bugzilla.suse.com/975533" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 975788", "url": "https://bugzilla.suse.com/975788" }, { "category": "self", "summary": "SUSE Bug 977417", "url": "https://bugzilla.suse.com/977417" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978469", "url": "https://bugzilla.suse.com/978469" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979074", "url": "https://bugzilla.suse.com/979074" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979485", "url": "https://bugzilla.suse.com/979485" }, { "category": "self", "summary": "SUSE Bug 979489", "url": "https://bugzilla.suse.com/979489" }, { "category": "self", "summary": "SUSE Bug 979521", "url": "https://bugzilla.suse.com/979521" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979922", "url": "https://bugzilla.suse.com/979922" }, { "category": "self", "summary": "SUSE Bug 980348", "url": "https://bugzilla.suse.com/980348" }, { "category": "self", "summary": "SUSE Bug 980363", "url": "https://bugzilla.suse.com/980363" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980856", "url": "https://bugzilla.suse.com/980856" }, { "category": "self", "summary": "SUSE Bug 980883", "url": "https://bugzilla.suse.com/980883" }, { "category": "self", "summary": "SUSE Bug 981038", "url": "https://bugzilla.suse.com/981038" }, { "category": "self", "summary": "SUSE Bug 981143", "url": "https://bugzilla.suse.com/981143" }, { "category": "self", "summary": "SUSE Bug 981344", "url": "https://bugzilla.suse.com/981344" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 982282", "url": "https://bugzilla.suse.com/982282" }, { "category": "self", "summary": "SUSE Bug 982354", "url": "https://bugzilla.suse.com/982354" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982698", "url": "https://bugzilla.suse.com/982698" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983318", "url": "https://bugzilla.suse.com/983318" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 983904", "url": "https://bugzilla.suse.com/983904" }, { "category": "self", "summary": "SUSE Bug 983977", "url": "https://bugzilla.suse.com/983977" }, { "category": "self", "summary": "SUSE Bug 984148", "url": "https://bugzilla.suse.com/984148" }, { "category": "self", "summary": "SUSE Bug 984456", "url": "https://bugzilla.suse.com/984456" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 984764", "url": "https://bugzilla.suse.com/984764" }, { "category": "self", "summary": "SUSE Bug 985232", "url": "https://bugzilla.suse.com/985232" }, { "category": "self", "summary": "SUSE Bug 985978", "url": "https://bugzilla.suse.com/985978" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986569", "url": "https://bugzilla.suse.com/986569" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 986811", "url": "https://bugzilla.suse.com/986811" }, { "category": "self", "summary": "SUSE Bug 988215", "url": "https://bugzilla.suse.com/988215" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE Bug 988552", "url": "https://bugzilla.suse.com/988552" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE CVE CVE-2014-9904 page", "url": "https://www.suse.com/security/cve/CVE-2014-9904/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8551 page", "url": "https://www.suse.com/security/cve/CVE-2015-8551/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8552 page", "url": "https://www.suse.com/security/cve/CVE-2015-8552/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8845 page", "url": "https://www.suse.com/security/cve/CVE-2015-8845/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3672 page", "url": "https://www.suse.com/security/cve/CVE-2016-3672/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5828 page", "url": "https://www.suse.com/security/cve/CVE-2016-5828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-19T08:48:37Z", "generator": { "date": "2016-08-19T08:48:37Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2105-1", "initial_release_date": "2016-08-19T08:48:37Z", "revision_history": [ { "date": "2016-08-19T08:48:37Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.62-60.62.1.noarch", "product": { "name": "kernel-devel-3.12.62-60.62.1.noarch", "product_id": "kernel-devel-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.62-60.62.1.noarch", "product": { "name": "kernel-macros-3.12.62-60.62.1.noarch", "product_id": "kernel-macros-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.62-60.62.1.noarch", "product": { "name": "kernel-source-3.12.62-60.62.1.noarch", "product_id": "kernel-source-3.12.62-60.62.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.62-60.62.3.noarch", "product": { "name": "kernel-docs-3.12.62-60.62.3.noarch", "product_id": "kernel-docs-3.12.62-60.62.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "product_id": "kernel-obs-build-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-base-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "product_id": "kernel-default-devel-3.12.62-60.62.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.ppc64le", "product": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le", "product_id": "kernel-syms-3.12.62-60.62.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.s390x", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.s390x", "product_id": "kernel-obs-build-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-3.12.62-60.62.1.s390x", "product_id": "kernel-default-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-base-3.12.62-60.62.1.s390x", "product_id": "kernel-default-base-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x", "product_id": "kernel-default-devel-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.62-60.62.1.s390x", "product": { "name": "kernel-default-man-3.12.62-60.62.1.s390x", "product_id": "kernel-default-man-3.12.62-60.62.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.s390x", "product": { "name": "kernel-syms-3.12.62-60.62.1.s390x", "product_id": "kernel-syms-3.12.62-60.62.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-extra-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-syms-3.12.62-60.62.1.x86_64", "product_id": "kernel-syms-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "product": { "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "product_id": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-devel-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "product_id": "kernel-ec2-extra-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-obs-build-3.12.62-60.62.1.x86_64", "product_id": "kernel-obs-build-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64", "product_id": "kernel-default-base-3.12.62-60.62.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.62-60.62.1.x86_64", "product": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64", "product_id": "kernel-xen-base-3.12.62-60.62.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64" }, "product_reference": "kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.62-60.62.3.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch" }, "product_reference": "kernel-docs-3.12.62-60.62.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-obs-build-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-syms-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-default-man-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-devel-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-macros-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.62-60.62.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch" }, "product_reference": "kernel-source-3.12.62-60.62.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le" }, "product_reference": "kernel-syms-3.12.62-60.62.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x" }, "product_reference": "kernel-syms-3.12.62-60.62.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-syms-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.62-60.62.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" }, "product_reference": "kernel-default-extra-3.12.62-60.62.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-9904", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-9904" } ], "notes": [ { "category": "general", "text": "The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-9904", "url": "https://www.suse.com/security/cve/CVE-2014-9904" }, { "category": "external", "summary": "SUSE Bug 986811 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986811" }, { "category": "external", "summary": "SUSE Bug 986941 for CVE-2014-9904", "url": "https://bugzilla.suse.com/986941" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2014-9904" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8551" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8551", "url": "https://www.suse.com/security/cve/CVE-2015-8551" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8551", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8551", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8551" }, { "cve": "CVE-2015-8552", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8552" } ], "notes": [ { "category": "general", "text": "The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka \"Linux pciback missing sanity checks.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8552", "url": "https://www.suse.com/security/cve/CVE-2015-8552" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-8552", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 957990 for CVE-2015-8552", "url": "https://bugzilla.suse.com/957990" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8552" }, { "cve": "CVE-2015-8845", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8845" } ], "notes": [ { "category": "general", "text": "The tm_reclaim_thread function in arch/powerpc/kernel/process.c in the Linux kernel before 4.4.1 on powerpc platforms does not ensure that TM suspend mode exists before proceeding with a tm_reclaim call, which allows local users to cause a denial of service (TM Bad Thing exception and panic) via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8845", "url": "https://www.suse.com/security/cve/CVE-2015-8845" }, { "category": "external", "summary": "SUSE Bug 975531 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975531" }, { "category": "external", "summary": "SUSE Bug 975533 for CVE-2015-8845", "url": "https://bugzilla.suse.com/975533" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2015-8845" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-3672", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3672" } ], "notes": [ { "category": "general", "text": "The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3672", "url": "https://www.suse.com/security/cve/CVE-2016-3672" }, { "category": "external", "summary": "SUSE Bug 974308 for CVE-2016-3672", "url": "https://bugzilla.suse.com/974308" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-3672" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5828" } ], "notes": [ { "category": "general", "text": "The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5828", "url": "https://www.suse.com/security/cve/CVE-2016-5828" }, { "category": "external", "summary": "SUSE Bug 986569 for CVE-2016-5828", "url": "https://bugzilla.suse.com/986569" }, { "category": "external", "summary": "SUSE Bug 991065 for CVE-2016-5828", "url": "https://bugzilla.suse.com/991065" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5828" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-default-1-4.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_62-60_62-xen-1-4.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.62-60.62.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.62-60.62.3.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.62-60.62.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.62-60.62.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-19T08:48:37Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:2632-1
Vulnerability from csaf_suse
Published
2016-10-25 21:19
Modified
2016-10-25 21:19
Summary
Security update for Linux Kernel Live Patch 10 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 10 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.51-52_34 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).
Patchnames
SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 10 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-52_34 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986362).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1554,SUSE-SLE-SERVER-12-2016-1554", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2632-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2632-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162632-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2632-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002356.html" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 10 for SLE 12", "tracking": { "current_release_date": "2016-10-25T21:19:41Z", "generator": { "date": "2016-10-25T21:19:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2632-1", "initial_release_date": "2016-10-25T21:19:41Z", "revision_history": [ { "date": "2016-10-25T21:19:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:41Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-default-6-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_51-52_34-xen-6-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-25T21:19:41Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:3069-1
Vulnerability from csaf_suse
Published
2016-12-09 13:20
Modified
2016-12-09 13:20
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
This feature was added:
- Support for the 2017 Intel Purley platform.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg.
- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.
- ALSA: hda - Add Intel Lewisburg device IDs Audio.
- avoid dentry crash triggered by NFS (bsc#984194).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- fs/select: introduce SIZE_MAX (bsc#1000189).
- i2c: i801: add Intel Lewisburg device IDs.
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- KVM: x86: SYSENTER emulation is broken (bsc#994618).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- md: lockless I/O submission for RAID1 (bsc#982783).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Don't disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Don't write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- random32: add prandom_u32_max (bsc#989152).
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- s390/dasd: fix hanging device after clear subchannel (bnc#994436).
- sata: Adding Intel Lewisburg device IDs for SATA.
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).
- USB: fix typo in wMaxPacketSize validation (bsc#991665).
- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: don't deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
Patchnames
slertesp4-kernel-source-12880
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThis feature was added:\n\n- Support for the 2017 Intel Purley platform. \n\nThe following security bugs were fixed:\n\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: Use after free in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg.\n- AHCI: Remove obsolete Intel Lewisburg SATA RAID device IDs.\n- ALSA: hda - Add Intel Lewisburg device IDs Audio.\n- avoid dentry crash triggered by NFS (bsc#984194).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- Delete patches.fixes/net-fix-crash-due-to-wrong-dev-in-calling.patch. (bsc#979514)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- fs/select: introduce SIZE_MAX (bsc#1000189).\n- i2c: i801: add Intel Lewisburg device IDs.\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- KVM: x86: SYSENTER emulation is broken (bsc#994618).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Don\u0027t disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Don\u0027t write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- random32: add prandom_u32_max (bsc#989152).\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436).\n- sata: Adding Intel Lewisburg device IDs for SATA.\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- Update patches.drivers/fcoe-0102-fcoe-ensure-that-skb-placed-on-the-fip_recv_list-are.patch (add bsc#732582 reference).\n- USB: fix typo in wMaxPacketSize validation (bsc#991665).\n- USB: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: don\u0027t deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-kernel-source-12880", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3069-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3069-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163069-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3069-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002461.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 732582", "url": "https://bugzilla.suse.com/732582" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 843236", "url": "https://bugzilla.suse.com/843236" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 934760", "url": "https://bugzilla.suse.com/934760" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 976867", "url": "https://bugzilla.suse.com/976867" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 979514", "url": "https://bugzilla.suse.com/979514" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 982218", "url": "https://bugzilla.suse.com/982218" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984102", "url": "https://bugzilla.suse.com/984102" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985206", "url": "https://bugzilla.suse.com/985206" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 989779", "url": "https://bugzilla.suse.com/989779" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991923", "url": "https://bugzilla.suse.com/991923" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993127", "url": "https://bugzilla.suse.com/993127" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 994926", "url": "https://bugzilla.suse.com/994926" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998399", "url": "https://bugzilla.suse.com/998399" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-09T13:20:33Z", "generator": { "date": "2016-12-09T13:20:33Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3069-1", "initial_release_date": "2016-12-09T13:20:33Z", "revision_history": [ { "date": "2016-12-09T13:20:33Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-65.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-65.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-65.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-65.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-09T13:20:33Z", "details": "low" } ], "title": "CVE-2016-7425" } ] }
suse-su-2016:2659-1
Vulnerability from csaf_suse
Published
2016-10-26 19:54
Modified
2016-10-26 19:54
Summary
Security update for Linux Kernel Live Patch 13 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 13 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_45 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 13 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_45 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1563,SUSE-SLE-SERVER-12-2016-1563", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2659-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2659-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162659-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2659-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002370.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 13 for SLE 12", "tracking": { "current_release_date": "2016-10-26T19:54:42Z", "generator": { "date": "2016-10-26T19:54:42Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2659-1", "initial_release_date": "2016-10-26T19:54:42Z", "revision_history": [ { "date": "2016-10-26T19:54:42Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:42Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_45-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:42Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2658-1
Vulnerability from csaf_suse
Published
2016-10-26 19:54
Modified
2016-10-26 19:54
Summary
Security update for Linux Kernel Live Patch 14 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 14 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.60-52_49 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 14 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.60-52_49 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1561,SUSE-SLE-SERVER-12-2016-1561", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2658-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2658-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162658-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2658-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002369.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 14 for SLE 12", "tracking": { "current_release_date": "2016-10-26T19:54:12Z", "generator": { "date": "2016-10-26T19:54:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2658-1", "initial_release_date": "2016-10-26T19:54:12Z", "revision_history": [ { "date": "2016-10-26T19:54:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:12Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_60-52_49-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T19:54:12Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2177-1
Vulnerability from csaf_suse
Published
2016-08-29 09:25
Modified
2016-08-29 09:25
Summary
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 5 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.59-60_41 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1284
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.59-60_41 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1284", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2177-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2177-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162177-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2177-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002233.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 5 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:25:46Z", "generator": { "date": "2016-08-29T09:25:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2177-1", "initial_release_date": "2016-08-29T09:25:46Z", "revision_history": [ { "date": "2016-08-29T09:25:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:46Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:46Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_41-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:46Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:3304-1
Vulnerability from csaf_suse
Published
2016-12-30 13:09
Modified
2016-12-30 13:09
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.
This feature was added:
- fate#320805: Execute in place (XIP) support for the ext2 filesystem.
The following security bugs were fixed:
- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)
- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a 'double fetch' vulnerability (bnc#987542)
- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608)
- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).
- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)
- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).
The following non-security bugs were fixed:
- aacraid: Fix RRQ overload (bsc#1003079).
- acpi / PM: Ignore wakeup setting if the ACPI companion can't wake up.
- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).
- apparmor: add missing id bounds check on dfa verification (bsc#1000304).
- apparmor: check that xindex is in trans_table bounds (bsc#1000304).
- apparmor: do not expose kernel stack (bsc#1000304).
- apparmor: don't check for vmalloc_addr if kvzalloc() failed (bsc#1000304).
- apparmor: ensure the target profile name is always audited (bsc#1000304).
- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).
- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).
- apparmor: fix audit full profile hname on successful load (bsc#1000304).
- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).
- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).
- apparmor: fix log failures for all profiles in a set (bsc#1000304).
- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).
- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).
- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).
- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).
- apparmor: fix refcount bug in profile replacement (bsc#1000304).
- apparmor: fix refcount race when finding a child profile (bsc#1000304).
- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).
- apparmor: fix uninitialized lsm_audit member (bsc#1000304).
- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).
- apparmor: internal paths should be treated as disconnected (bsc#1000304).
- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).
- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).
- avoid dentry crash triggered by NFS (bsc#984194).
- be2net: Don't leak iomapped memory on removal (bsc#921784 FATE#318561).
- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).
- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).
- be2net: remove vlan promisc capability from VF's profile descriptors (bsc#921784 FATE#318561).
- blkfront: fix an error path memory leak (luckily none so far).
- blk-mq: fix undefined behaviour in order_to_size().
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).
- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.
- bonding: Prevent IPv6 link local address on enslaved devices.
- bonding: prevent out of bound accesses.
- bonding: set carrier off for devices created through netlink (bsc#999577).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).
- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).
- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).
- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).
- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)
- btrfs: fix fitrim discarding device area reserved for boot loader's use (bsc#904489).
- btrfs: handle quota reserve failure properly (bsc#1005666).
- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).
- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).
- btrfs: properly track when rescan worker is running (bsc#989953).
- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).
- btrfs: skip superblocks during discard (bsc#904489).
- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).
- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).
- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).
- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the 'request', not the 'response' (bsc#995153).
- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).
- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).
- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).
- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)
- efi: Small leak on error in runtime map code (fate#315019).
- ext2: Enable ext2 driver in config files (bsc#976195).
- ext4: Add parameter for tuning handling of ext2 (bsc#976195).
- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).
- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).
- hyperv: enable call to clockevents_unbind_device in kexec/kdump path
- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel
- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).
- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).
- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).
- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).
- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).
- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).
- ipv6: fix multipath route replace error recovery (bsc#930399).
- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).
- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).
- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).
- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).
- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).
- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).
- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).
- libceph: enable large, variable-sized OSD requests (bsc#988715).
- libceph: make r_request msg_size calculation clearer (bsc#988715).
- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).
- libceph: osdc->req_mempool should be backed by a slab pool (bsc#988715).
- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).
- libfc: do not send ABTS when resetting exchanges (bsc#962846).
- libfc: Do not take rdata->rp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).
- libfc: Fixup disc_mutex handling (bsc#962846).
- libfc: fixup locking of ptp_setup() (bsc#962846).
- libfc: Issue PRLI after a PRLO has been received (bsc#962846).
- libfc: reset exchange manager during LOGO handling (bsc#962846).
- libfc: Revisit kref handling (bnc#990245).
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- libfc: send LOGO for PLOGI failure (bsc#962846).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).
- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- module: Issue warnings when tainting kernel (bsc#974406).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).
- msi-x: fix an error path (luckily none so far).
- netback: fix flipping mode (bsc#996664).
- netback: fix refounting (bsc#978094).
- netfront: don't truncate grant references.
- netfront: use correct linear area after linearizing an skb (bsc#1007886).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).
- nfs: Add a stub for GETDEVICELIST (bnc#898675).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfsd: Use free_conn to free connection (bsc#979451).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).
- nfs: fix pg_test page count calculation (bnc#898675).
- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).
- oops on restarting network with bonding mode4 (lacp) (bsc#876145).
- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).
- perf/x86/intel: Fix bug for 'cycles:p' and 'cycles:pp' on SLM (bsc#997896).
- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).
- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).
- qgroup: Prevent qgroup->reserved from going subzero (bsc#993841).
- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)
- radeon: avoid boot hang in Xen Dom0 (luckily none so far).
- ratelimit: extend to print suppressed messages on release (bsc#979928).
- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).
- rbd: truncate objects on cmpext short reads (bsc#988715).
- Revert 'Input: i8042 - break load dependency between atkbd/psmouse and i8042'.
- Revert 'Input: i8042 - set up shared ps2_cmd_mutex for AUX ports'.
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- rtnetlink: avoid 0 sized arrays.
- RTNL: assertion failed at dev.c (bsc#875631).
- s390: add SMT support (bnc#994438).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).
- squashfs3: properly handle dir_emit() failures (bsc#998795).
- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).
- SUNRPC: Fix a regression when reconnecting (bsc#946309).
- supported.conf: Add ext2
- supported.conf: Add iscsi modules to -base (bsc#997299)
- supported.conf: Add tun to -base (bsc#992593)
- supported.conf: Add veth to -base (bsc#992591)
- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).
- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).
- tcp: add proper TS val into RST packets (bsc#937086).
- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).
- tcp: fix child sockets to use system default congestion control if not set.
- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).
- tcp: refresh skb timestamp at retransmit time (bsc#937086).
- timers: Use proper base migration in add_timer_on() (bnc#993392).
- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).
- tunnels: Remove encapsulation offloads on decap (bsc#1001486).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).
- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).
- xenbus: don't invoke ->is_ready() for most device states (bsc#987333).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen/pciback: Fix conf_space read/write overlap check.
- xen-pciback: return proper values during BAR sizing.
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).
- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- xhci: Check if slot is already in default state before moving it there (FATE#315518).
- xhci: silence warnings in switch (bnc#991665).
Patchnames
SUSE-SLE-RT-12-SP1-2016-1938
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 RT kernel was updated to 3.12.67 to receive various security and bugfixes.\n\nThis feature was added:\n\n- fate#320805: Execute in place (XIP) support for the ext2 filesystem.\n\nThe following security bugs were fixed:\n\n- CVE-2016-2069: Race condition in arch/x86/mm/tlb.c in the Linux kernel allowed local users to gain privileges by triggering access to a paging structure by a different CPU (bnc#963767).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986362).\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004418).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack (bnc#989152)\n- CVE-2016-6130: Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \u0027double fetch\u0027 vulnerability (bnc#987542)\n- CVE-2016-6327: System using the infiniband support module ib_srpt were vulnerable to a denial of service by system crash by a local attacker who is able to abort writes by sending the ABORT_TASK command (bsc#994758)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608)\n- CVE-2016-6828: Use after free 4 in tcp_xmit_retransmit_queue or other tcp_ functions (bsc#994296)\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bsc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserved the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bsc#995968).\n- CVE-2016-7425: A buffer overflow in the Linux Kernel in arcmsr_iop_message_xfer() could have caused kernel heap corruption and arbitraty kernel code execution (bsc#999932)\n- CVE-2016-8658: Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel allowed local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket (bsc#1004462).\n\nThe following non-security bugs were fixed:\n\n- aacraid: Fix RRQ overload (bsc#1003079).\n- acpi / PM: Ignore wakeup setting if the ACPI companion can\u0027t wake up.\n- AF_VSOCK: Shrink the area influenced by prepare_to_wait (bsc#994520).\n- apparmor: add missing id bounds check on dfa verification (bsc#1000304).\n- apparmor: check that xindex is in trans_table bounds (bsc#1000304).\n- apparmor: do not expose kernel stack (bsc#1000304).\n- apparmor: don\u0027t check for vmalloc_addr if kvzalloc() failed (bsc#1000304).\n- apparmor: ensure the target profile name is always audited (bsc#1000304).\n- apparmor: exec should not be returning ENOENT when it denies (bsc#1000304).\n- apparmor: fix arg_size computation for when setprocattr is null terminated (bsc#1000304).\n- apparmor: fix audit full profile hname on successful load (bsc#1000304).\n- apparmor: fix change_hat not finding hat after policy replacement (bsc#1000287).\n- apparmor: fix disconnected bind mnts reconnection (bsc#1000304).\n- apparmor: fix log failures for all profiles in a set (bsc#1000304).\n- apparmor: fix module parameters can be changed after policy is locked (bsc#1000304).\n- apparmor: fix oops in profile_unpack() when policy_db is not present (bsc#1000304).\n- apparmor: fix oops, validate buffer size in apparmor_setprocattr() (bsc#1000304).\n- apparmor: fix put() parent ref after updating the active ref (bsc#1000304).\n- apparmor: fix refcount bug in profile replacement (bsc#1000304).\n- apparmor: fix refcount race when finding a child profile (bsc#1000304).\n- apparmor: fix replacement bug that adds new child to old parent (bsc#1000304).\n- apparmor: fix uninitialized lsm_audit member (bsc#1000304).\n- apparmor: fix update the mtime of the profile file on replacement (bsc#1000304).\n- apparmor: internal paths should be treated as disconnected (bsc#1000304).\n- apparmor: use list_next_entry instead of list_entry_next (bsc#1000304).\n- arm64: Ensure pmd_present() returns false after pmd_mknotpresent() (Automatic NUMA Balancing).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- be2net: Don\u0027t leak iomapped memory on removal (bsc#921784 FATE#318561).\n- be2net: fix BE3-R FW download compatibility check (bsc#921784 FATE#318561).\n- be2net: fix wrong return value in be_check_ufi_compatibility() (bsc#921784 FATE#318561).\n- be2net: remove vlan promisc capability from VF\u0027s profile descriptors (bsc#921784 FATE#318561).\n- blkfront: fix an error path memory leak (luckily none so far).\n- blk-mq: fix undefined behaviour in order_to_size().\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bluetooth: Fix potential NULL dereference in RFCOMM bind callback (bsc#1003925, CVE-2015-8956).\n- bond: Check length of IFLA_BOND_ARP_IP_TARGET attributes.\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix curr_active_slave/carrier with loadbalance arp monitoring.\n- bonding: Prevent IPv6 link local address on enslaved devices.\n- bonding: prevent out of bound accesses.\n- bonding: set carrier off for devices created through netlink (bsc#999577).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: add missing discards when unpinning extents with -o discard (bsc#904489).\n- btrfs: btrfs_issue_discard ensure offset/length are aligned to sector boundaries (bsc#904489).\n- btrfs: Disable btrfs-8448-improve-performance-on-fsync-against-new-inode.patch (bsc#981597).\n- btrfs: do not create or leak aliased root while cleaning up orphans (bsc#904489).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- btrfs: explictly delete unused block groups in close_ctree and ro-remount (bsc#904489).\n- btrfs: Fix a data space underflow warning (bsc#985562, bsc#975596, bsc#984779)\n- btrfs: fix fitrim discarding device area reserved for boot loader\u0027s use (bsc#904489).\n- btrfs: handle quota reserve failure properly (bsc#1005666).\n- btrfs: iterate over unused chunk space in FITRIM (bsc#904489).\n- btrfs: make btrfs_issue_discard return bytes discarded (bsc#904489).\n- btrfs: properly track when rescan worker is running (bsc#989953).\n- btrfs: remove unnecessary locking of cleaner_mutex to avoid deadlock (bsc#904489).\n- btrfs: skip superblocks during discard (bsc#904489).\n- btrfs: test_check_exists: Fix infinite loop when searching for free space entries (bsc#987192).\n- btrfs: waiting on qgroup rescan should not always be interruptible (bsc#992712).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cephfs: ignore error from invalidate_inode_pages2_range() in direct write (bsc#995153).\n- cephfs: remove warning when ceph_releasepage() is called on dirty page (bsc#995153).\n- ceph: Refresh patches.suse/CFS-0259-ceph-Asynchronous-IO-support.patch. After a write, we must free the \u0027request\u0027, not the \u0027response\u0027 (bsc#995153).\n- clockevents: export clockevents_unbind_device instead of clockevents_unbind (bnc#937888).\n- conntrack: RFC5961 challenge ACK confuse conntrack LAST-ACK transition (bsc#966864).\n- cxgbi: fix uninitialized flowi6 (bsc#924384 FATE#318570 bsc#921338).\n- dm: fix AB-BA deadlock in __dm_destroy(). (bsc#970943)\n- efi: Small leak on error in runtime map code (fate#315019).\n- ext2: Enable ext2 driver in config files (bsc#976195).\n- ext4: Add parameter for tuning handling of ext2 (bsc#976195).\n- Fix kabi change cause by adding flock_owner to open_context (bsc#998689).\n- fix xfs-handle-dquot-buffer-readahead-in-log-recovery-co.patch (bsc#1003153).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- ftrace/x86: Set ftrace_stub to weak to prevent gcc from using short jumps to it (bsc#984419).\n- hyperv: enable call to clockevents_unbind_device in kexec/kdump path\n- hyperv: replace KEXEC_CORE by plain KEXEC because we lack 2965faa5e0 in the base kernel\n- i40e: fix an uninitialized variable bug (bnc#857397 FATE#315659).\n- ib/iwpm: Fix a potential skb leak (bsc#924381 FATE#318568 bsc#921338).\n- ib/mlx5: Fix RC transport send queue overhead computation (bnc#865545 FATE#316891).\n- introduce NETIF_F_GSO_ENCAP_ALL helper mask (bsc#1001486).\n- iommu/amd: Update Alias-DTE in update_device_table() (bsc#975772).\n- ipv6: Fix improper use or RCU in patches.kabi/ipv6-add-complete-rcu-protection-around-np-opt.kabi.patch. (bsc#961257).\n- ipv6: fix multipath route replace error recovery (bsc#930399).\n- ipv6: send NEWLINK on RA managed/otherconf changes (bsc#934067).\n- ipv6: send only one NEWLINK when RA causes changes (bsc#934067).\n- iscsi: Add a missed complete in iscsit_close_connection (bsc#992555, bsc#987805).\n- kabi: work around kabi changes from commit 53f9ff48f636 (bsc#988617).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kernel/fork: fix CLONE_CHILD_CLEARTID regression in nscd (bnc#941420).\n- kernel/printk: fix faulty logic in the case of recursive printk (bnc#744692, bnc#789311).\n- kvm: do not handle APIC access page if in-kernel irqchip is not in use (bsc#959463).\n- kvm: vmx: defer load of APIC access page address during reset (bsc#959463).\n- libceph: enable large, variable-sized OSD requests (bsc#988715).\n- libceph: make r_request msg_size calculation clearer (bsc#988715).\n- libceph: move r_reply_op_{len,result} into struct ceph_osd_req_op (bsc#988715).\n- libceph: osdc-\u003ereq_mempool should be backed by a slab pool (bsc#988715).\n- libceph: rename ceph_osd_req_op::payload_len to indata_len (bsc#988715).\n- libfc: do not send ABTS when resetting exchanges (bsc#962846).\n- libfc: Do not take rdata-\u003erp_mutex when processing a -FC_EX_CLOSED ELS response (bsc#962846).\n- libfc: Fixup disc_mutex handling (bsc#962846).\n- libfc: fixup locking of ptp_setup() (bsc#962846).\n- libfc: Issue PRLI after a PRLO has been received (bsc#962846).\n- libfc: reset exchange manager during LOGO handling (bsc#962846).\n- libfc: Revisit kref handling (bnc#990245).\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- libfc: send LOGO for PLOGI failure (bsc#962846).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid5: fix a recently broken BUG_ON() (bsc#1006691).\n- mm, cma: prevent nr_isolated_* counters from going negative (bnc#971975).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- module: Issue warnings when tainting kernel (bsc#974406).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mpt3sas: Update patches.drivers/mpt3sas-Fix-use-sas_is_tlr_enabled-API-before-enabli.patch (bsc#967640, bsc#992244).\n- msi-x: fix an error path (luckily none so far).\n- netback: fix flipping mode (bsc#996664).\n- netback: fix refounting (bsc#978094).\n- netfront: don\u0027t truncate grant references.\n- netfront: use correct linear area after linearizing an skb (bsc#1007886).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1003400).\n- nfs: Add a stub for GETDEVICELIST (bnc#898675).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfsd: Use free_conn to free connection (bsc#979451).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: fix BUG() crash in notify_change() with patch to chown_common() (bnc#876463).\n- nfs: fix pg_test page count calculation (bnc#898675).\n- nfs: nfs4_fl_prepare_ds must be careful about reporting success (bsc#1000776).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: Ensure nfs_atomic_open set the dentry verifier on ENOENT (bnc#866130).\n- oops on restarting network with bonding mode4 (lacp) (bsc#876145).\n- packet: tpacket_snd(): fix signed/unsigned comparison (bsc#874131).\n- perf/x86/intel: Fix bug for \u0027cycles:p\u0027 and \u0027cycles:pp\u0027 on SLM (bsc#997896).\n- PM / hibernate: Fix 2G size issue of snapshot image verification (bsc#1004252).\n- PM / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#998825).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- printk: add kernel parameter to control writes to /dev/kmsg (bsc#979928).\n- qgroup: Prevent qgroup-\u003ereserved from going subzero (bsc#993841).\n- qlcnic: potential NULL dereference in qlcnic_83xx_get_minidump_template() (bsc#922064 FATE#318609)\n- radeon: avoid boot hang in Xen Dom0 (luckily none so far).\n- ratelimit: extend to print suppressed messages on release (bsc#979928).\n- ratelimit: fix bug in time interval by resetting right begin time (bsc#979928).\n- rbd: truncate objects on cmpext short reads (bsc#988715).\n- Revert \u0027Input: i8042 - break load dependency between atkbd/psmouse and i8042\u0027.\n- Revert \u0027Input: i8042 - set up shared ps2_cmd_mutex for AUX ports\u0027.\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- rtnetlink: avoid 0 sized arrays.\n- RTNL: assertion failed at dev.c (bsc#875631).\n- s390: add SMT support (bnc#994438).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bsc#1002165, bsc#1001419).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- sd: Fix memory leak caused by RESET_WP patch (bsc#999779).\n- squashfs3: properly handle dir_emit() failures (bsc#998795).\n- SUNRPC: Add missing support for RPC_CLNT_CREATE_NO_RETRANS_TIMEOUT (bnc#868923).\n- SUNRPC: Fix a regression when reconnecting (bsc#946309).\n- supported.conf: Add ext2\n- supported.conf: Add iscsi modules to -base (bsc#997299)\n- supported.conf: Add tun to -base (bsc#992593)\n- supported.conf: Add veth to -base (bsc#992591)\n- target: Fix missing complete during ABORT_TASK + CMD_T_FABRIC_STOP (bsc#987621).\n- target: Fix race between iscsi-target connection shutdown + ABORT_TASK (bsc#987621).\n- tcp: add proper TS val into RST packets (bsc#937086).\n- tcp: align tcp_xmit_size_goal() on tcp_tso_autosize() (bsc#937086).\n- tcp: fix child sockets to use system default congestion control if not set.\n- tcp: fix cwnd limited checking to improve congestion control (bsc#988617).\n- tcp: refresh skb timestamp at retransmit time (bsc#937086).\n- timers: Use proper base migration in add_timer_on() (bnc#993392).\n- tunnels: Do not apply GRO to multiple layers of encapsulation (bsc#1001486).\n- tunnels: Remove encapsulation offloads on decap (bsc#1001486).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usbhid: add ATEN CS962 to list of quirky devices (bsc#1007615).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86: Removed the free memblock of hibernat keys to avoid memory corruption (bsc#990058).\n- x86/tlb/trace: Do not trace on CPU that is offline (TLB Performance git-fixes).\n- xenbus: don\u0027t invoke -\u003eis_ready() for most device states (bsc#987333).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen/pciback: Fix conf_space read/write overlap check.\n- xen-pciback: return proper values during BAR sizing.\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: fixed signedness of error code in xfs_inode_buf_verify (bsc#1003153).\n- xfs: handle dquot buffer readahead in log recovery correctly (bsc#955446).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- xhci: Check if slot is already in default state before moving it there (FATE#315518).\n- xhci: silence warnings in switch (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-RT-12-SP1-2016-1938", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_3304-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:3304-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:3304-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002539.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1000287", "url": "https://bugzilla.suse.com/1000287" }, { "category": "self", "summary": "SUSE Bug 1000304", "url": "https://bugzilla.suse.com/1000304" }, { "category": "self", "summary": "SUSE Bug 1000776", "url": "https://bugzilla.suse.com/1000776" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1001486", "url": "https://bugzilla.suse.com/1001486" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003079", "url": "https://bugzilla.suse.com/1003079" }, { "category": "self", "summary": "SUSE Bug 1003153", "url": "https://bugzilla.suse.com/1003153" }, { "category": "self", "summary": "SUSE Bug 1003400", "url": "https://bugzilla.suse.com/1003400" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004252", "url": "https://bugzilla.suse.com/1004252" }, { "category": "self", "summary": "SUSE Bug 1004418", "url": "https://bugzilla.suse.com/1004418" }, { "category": "self", "summary": "SUSE Bug 1004462", "url": "https://bugzilla.suse.com/1004462" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005666", "url": "https://bugzilla.suse.com/1005666" }, { "category": "self", "summary": "SUSE Bug 1006691", "url": "https://bugzilla.suse.com/1006691" }, { "category": "self", "summary": "SUSE Bug 1007615", "url": "https://bugzilla.suse.com/1007615" }, { "category": "self", "summary": "SUSE Bug 1007886", "url": "https://bugzilla.suse.com/1007886" }, { "category": "self", "summary": "SUSE Bug 744692", "url": "https://bugzilla.suse.com/744692" }, { "category": "self", "summary": "SUSE Bug 789311", "url": "https://bugzilla.suse.com/789311" }, { "category": "self", "summary": "SUSE Bug 857397", "url": "https://bugzilla.suse.com/857397" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 865545", "url": "https://bugzilla.suse.com/865545" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 868923", "url": "https://bugzilla.suse.com/868923" }, { "category": "self", "summary": "SUSE Bug 874131", "url": "https://bugzilla.suse.com/874131" }, { "category": "self", "summary": "SUSE Bug 875631", "url": "https://bugzilla.suse.com/875631" }, { "category": "self", "summary": "SUSE Bug 876145", "url": "https://bugzilla.suse.com/876145" }, { "category": "self", "summary": "SUSE Bug 876463", "url": "https://bugzilla.suse.com/876463" }, { "category": "self", "summary": "SUSE Bug 898675", "url": "https://bugzilla.suse.com/898675" }, { "category": "self", "summary": "SUSE Bug 904489", "url": "https://bugzilla.suse.com/904489" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 921338", "url": "https://bugzilla.suse.com/921338" }, { "category": "self", "summary": "SUSE Bug 921784", "url": "https://bugzilla.suse.com/921784" }, { "category": "self", "summary": "SUSE Bug 922064", "url": "https://bugzilla.suse.com/922064" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 924381", "url": "https://bugzilla.suse.com/924381" }, { "category": "self", "summary": "SUSE Bug 924384", "url": "https://bugzilla.suse.com/924384" }, { "category": "self", "summary": "SUSE Bug 930399", "url": "https://bugzilla.suse.com/930399" }, { "category": "self", "summary": "SUSE Bug 934067", "url": "https://bugzilla.suse.com/934067" }, { "category": "self", "summary": "SUSE Bug 937086", "url": "https://bugzilla.suse.com/937086" }, { "category": "self", "summary": "SUSE Bug 937888", "url": "https://bugzilla.suse.com/937888" }, { "category": "self", "summary": "SUSE Bug 941420", "url": "https://bugzilla.suse.com/941420" }, { "category": "self", "summary": "SUSE Bug 946309", "url": "https://bugzilla.suse.com/946309" }, { "category": "self", "summary": "SUSE Bug 955446", "url": "https://bugzilla.suse.com/955446" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 959463", "url": "https://bugzilla.suse.com/959463" }, { "category": "self", "summary": "SUSE Bug 961257", "url": "https://bugzilla.suse.com/961257" }, { "category": "self", "summary": "SUSE Bug 962846", "url": "https://bugzilla.suse.com/962846" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963767", "url": "https://bugzilla.suse.com/963767" }, { "category": "self", "summary": "SUSE Bug 966864", "url": "https://bugzilla.suse.com/966864" }, { "category": "self", "summary": "SUSE Bug 967640", "url": "https://bugzilla.suse.com/967640" }, { "category": "self", "summary": "SUSE Bug 970943", "url": "https://bugzilla.suse.com/970943" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 974406", "url": "https://bugzilla.suse.com/974406" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 975596", "url": "https://bugzilla.suse.com/975596" }, { "category": "self", "summary": "SUSE Bug 975772", "url": "https://bugzilla.suse.com/975772" }, { "category": "self", "summary": "SUSE Bug 976195", "url": "https://bugzilla.suse.com/976195" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 978094", "url": "https://bugzilla.suse.com/978094" }, { "category": "self", "summary": "SUSE Bug 979451", "url": "https://bugzilla.suse.com/979451" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979928", "url": "https://bugzilla.suse.com/979928" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 981597", "url": "https://bugzilla.suse.com/981597" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984419", "url": "https://bugzilla.suse.com/984419" }, { "category": "self", "summary": "SUSE Bug 984779", "url": "https://bugzilla.suse.com/984779" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985562", "url": "https://bugzilla.suse.com/985562" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987192", "url": "https://bugzilla.suse.com/987192" }, { "category": "self", "summary": "SUSE Bug 987333", "url": "https://bugzilla.suse.com/987333" }, { "category": "self", "summary": "SUSE Bug 987542", "url": "https://bugzilla.suse.com/987542" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 987621", "url": "https://bugzilla.suse.com/987621" }, { "category": "self", "summary": "SUSE Bug 987805", "url": "https://bugzilla.suse.com/987805" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 988617", "url": "https://bugzilla.suse.com/988617" }, { "category": "self", "summary": "SUSE Bug 988715", "url": "https://bugzilla.suse.com/988715" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989953", "url": "https://bugzilla.suse.com/989953" }, { "category": "self", "summary": "SUSE Bug 990058", "url": "https://bugzilla.suse.com/990058" }, { "category": "self", "summary": "SUSE Bug 990245", "url": "https://bugzilla.suse.com/990245" }, { "category": "self", "summary": "SUSE Bug 991247", "url": "https://bugzilla.suse.com/991247" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE Bug 992244", "url": "https://bugzilla.suse.com/992244" }, { "category": "self", "summary": "SUSE Bug 992555", "url": "https://bugzilla.suse.com/992555" }, { "category": "self", "summary": "SUSE Bug 992568", "url": "https://bugzilla.suse.com/992568" }, { "category": "self", "summary": "SUSE Bug 992591", "url": "https://bugzilla.suse.com/992591" }, { "category": "self", "summary": "SUSE Bug 992593", "url": "https://bugzilla.suse.com/992593" }, { "category": "self", "summary": "SUSE Bug 992712", "url": "https://bugzilla.suse.com/992712" }, { "category": "self", "summary": "SUSE Bug 993392", "url": "https://bugzilla.suse.com/993392" }, { "category": "self", "summary": "SUSE Bug 993841", "url": "https://bugzilla.suse.com/993841" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994167", "url": "https://bugzilla.suse.com/994167" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994438", "url": "https://bugzilla.suse.com/994438" }, { "category": "self", "summary": "SUSE Bug 994520", "url": "https://bugzilla.suse.com/994520" }, { "category": "self", "summary": "SUSE Bug 994758", "url": "https://bugzilla.suse.com/994758" }, { "category": "self", "summary": "SUSE Bug 995153", "url": "https://bugzilla.suse.com/995153" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 997299", "url": "https://bugzilla.suse.com/997299" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 997896", "url": "https://bugzilla.suse.com/997896" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 998795", "url": "https://bugzilla.suse.com/998795" }, { "category": "self", "summary": "SUSE Bug 998825", "url": "https://bugzilla.suse.com/998825" }, { "category": "self", "summary": "SUSE Bug 999577", "url": "https://bugzilla.suse.com/999577" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999779", "url": "https://bugzilla.suse.com/999779" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2069 page", "url": "https://www.suse.com/security/cve/CVE-2016-2069/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6130 page", "url": "https://www.suse.com/security/cve/CVE-2016-6130/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6327 page", "url": "https://www.suse.com/security/cve/CVE-2016-6327/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8658 page", "url": "https://www.suse.com/security/cve/CVE-2016-8658/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-30T13:09:04Z", "generator": { "date": "2016-12-30T13:09:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:3304-1", "initial_release_date": "2016-12-30T13:09:04Z", "revision_history": [ { "date": "2016-12-30T13:09:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-devel-rt-3.12.67-60.27.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch", "product_id": "kernel-source-rt-3.12.67-60.27.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-base-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "product_id": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "product_id": "kernel-syms-rt-3.12.67-60.27.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP1", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1" } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-devel-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-base-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.12.67-60.27.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch" }, "product_reference": "kernel-source-rt-3.12.67-60.27.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.12.67-60.27.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP1", "product_id": "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" }, "product_reference": "kernel-syms-rt-3.12.67-60.27.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-2069", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2069" } ], "notes": [ { "category": "general", "text": "Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2069", "url": "https://www.suse.com/security/cve/CVE-2016-2069" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-2069", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-2069", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 963767 for CVE-2016-2069", "url": "https://bugzilla.suse.com/963767" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-2069" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6130" } ], "notes": [ { "category": "general", "text": "Race condition in the sclp_ctl_ioctl_sccb function in drivers/s390/char/sclp_ctl.c in the Linux kernel before 4.6 allows local users to obtain sensitive information from kernel memory by changing a certain length value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6130", "url": "https://www.suse.com/security/cve/CVE-2016-6130" }, { "category": "external", "summary": "SUSE Bug 987542 for CVE-2016-6130", "url": "https://bugzilla.suse.com/987542" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.2, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6130" }, { "cve": "CVE-2016-6327", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6327" } ], "notes": [ { "category": "general", "text": "drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6327", "url": "https://www.suse.com/security/cve/CVE-2016-6327" }, { "category": "external", "summary": "SUSE Bug 994748 for CVE-2016-6327", "url": "https://bugzilla.suse.com/994748" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6327" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-8658", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8658" } ], "notes": [ { "category": "general", "text": "Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8658", "url": "https://www.suse.com/security/cve/CVE-2016-8658" }, { "category": "external", "summary": "SUSE Bug 1004462 for CVE-2016-8658", "url": "https://bugzilla.suse.com/1004462" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-compute_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-devel-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-base-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-rt_debug-devel-3.12.67-60.27.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP1:kernel-source-rt-3.12.67-60.27.1.noarch", "SUSE Linux Enterprise Real Time 12 SP1:kernel-syms-rt-3.12.67-60.27.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-12-30T13:09:04Z", "details": "low" } ], "title": "CVE-2016-8658" } ] }
suse-su-2016:2179-1
Vulnerability from csaf_suse
Published
2016-08-29 09:26
Modified
2016-08-29 09:26
Summary
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 2 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.51-60_25 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1287
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.51-60_25 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1287", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2179-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2179-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162179-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2179-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002235.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 2 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:26:12Z", "generator": { "date": "2016-08-29T09:26:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2179-1", "initial_release_date": "2016-08-29T09:26:12Z", "revision_history": [ { "date": "2016-08-29T09:26:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64", "product_id": "kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:12Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:12Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-default-5-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_51-60_25-xen-5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:12Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:2655-1
Vulnerability from csaf_suse
Published
2016-10-26 14:15
Modified
2016-10-26 14:15
Summary
Security update for Linux Kernel Live Patch 12 for SLE 12
Notes
Title of the patch
Security update for Linux Kernel Live Patch 12 for SLE 12
Description of the patch
This update for the Linux Kernel 3.12.55-52_42 fixes several issues.
The following security bugs were fixed:
- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 12 for SLE 12", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.55-52_42 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-5195: A local privilege escalation using MAP_PRIVATE was fixed, which is reportedly exploited in the wild (bsc#1004419).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-SAP-12-2016-1559,SUSE-SLE-SERVER-12-2016-1559", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2655-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2655-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162655-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2655-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-October/002367.html" }, { "category": "self", "summary": "SUSE Bug 1004419", "url": "https://bugzilla.suse.com/1004419" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" } ], "title": "Security update for Linux Kernel Live Patch 12 for SLE 12", "tracking": { "current_release_date": "2016-10-26T14:15:52Z", "generator": { "date": "2016-10-26T14:15:52Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2655-1", "initial_release_date": "2016-10-26T14:15:52Z", "revision_history": [ { "date": "2016-10-26T14:15:52Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", "product_id": "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T14:15:52Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-default-3-2.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:kgraft-patch-3_12_55-52_42-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-10-26T14:15:52Z", "details": "important" } ], "title": "CVE-2016-5195" } ] }
suse-su-2016:2976-1
Vulnerability from csaf_suse
Published
2016-12-02 11:04
Modified
2016-12-02 11:04
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
For the PowerPC64 a new 'bigmem' flavor has been added to support big Power machines. (FATE#319026)
The following security bugs were fixed:
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).
The following non-security bugs were fixed:
- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).
- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).
- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- avoid dentry crash triggered by NFS (bsc#984194).
- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).
- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).
- blktap2: eliminate race from deferred work queue handling (bsc#911687).
- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).
- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).
- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).
- btrfs: account for non-CoW'd blocks in btrfs_abort_transaction (bsc#983619).
- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- config.conf: add bigmem flavour on ppc64
- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).
- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).
- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).
- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).
- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).
- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).
- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).
- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).
- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).
- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).
- drivers: hv: vss: run only on supported host versions (bnc#986337).
- fs/cifs: cifs_get_root shouldn't use path with tree name (bsc#963655, bsc#979681).
- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).
- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).
- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- fs/cifs: make share unaccessible at root level mountable (bsc#799133).
- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).
- fs/select: add vmalloc fallback for select(2) (bsc#1000189).
- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).
- i2c: i801: add Intel Lewisburg device IDs (fate#319286).
- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).
- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).
- increase CONFIG_NR_IRQS 512 -> 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)
- introduce SIZE_MAX (bsc#1000189).
- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).
- kabi: Import kabi files from 3.0.101-80
- kabi-fix for flock_owner addition (bsc#998689).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)
- libfc: sanity check cpu number extracted from xid (bsc#988440).
- lib/vsprintf: implement bitmap printing through '%*pb[l]' (bnc#1003866).
- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).
- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).
- md: check command validity early in md_ioctl() (bsc#1004520).
- md: Drop sending a change uevent when stopping (bsc#1003568).
- md: fix problem when adding device to read-only array with bitmap (bnc#771065).
- md: lockless I/O submission for RAID1 (bsc#982783).
- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).
- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).
- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).
- mm/memory.c: actually remap enough memory (bnc#1005903).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).
- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.
- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).
- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).
- mshyperv: fix recognition of Hyper-V guest crash MSR's (bnc#986337).
- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).
- netback: fix flipping mode (bsc#996664).
- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).
- netvsc: fix incorrect receive checksum offloading (bnc#1006917).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).
- nfs: Do not drop directory dentry which is in use (bsc#993127).
- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).
- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).
- nfs: Fix a regression in the read() syscall (bsc#999584).
- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).
- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).
- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).
- nfsv4: add flock_owner to open context (bnc#998689).
- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).
- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).
- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).
- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).
- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).
- oom: print nodemask in the oom report (bnc#1003866).
- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).
- pciback: fix conf_space read/write overlap check.
- pciback: return proper values during BAR sizing.
- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).
- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).
- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo 'CONFIG_PMAC' obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu
- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).
- powerpc/mm: Change the swap encoding in pte (bsc#973203).
- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).
- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).
- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).
- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).
- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).
- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).
- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).
- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).
- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).
- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).
- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).
- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- powerpc: Update kernel VSID range (bsc#928138,fate#319026).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)
- random32: add prandom_u32_max (bsc#989152).
- remove problematic preprocessor constructs (bsc#928138,fate#319026).
- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.
- rpm/package-descriptions: add -bigmem description
- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).
- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).
- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).
- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).
- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).
- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).
- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM
- scripts/bigmem-generate-ifdef-guard: make executable
- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).
- scsi: do not print 'reservation conflict' for TEST UNIT READY (bsc#984102).
- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).
- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)
- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).
- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).
- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).
- sort hyperv patches properly in series.conf
- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).
- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).
- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).
- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).
- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).
- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).
- vlan: mask vlan prio bits (bsc#979514).
- vmxnet3: Wake queue from reset work (bsc#999907).
- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).
- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).
- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).
- x86/gart: Check for GART support before accessing GART registers (fate#321400).
- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).
- xenbus: inspect the correct type in xenbus_dev_request_and_reply().
- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).
- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).
- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).
- zfcp: fix ELS/GS request&response length for hardware data router (bnc#1003677, LTC#144308).
- zfcp: fix payload trace length for SAN request&response (bnc#1003677, LTC#144312).
- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).
- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).
- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).
- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).
- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).
Patchnames
sdksp4-kernel-12869,slessp4-kernel-12869,slexsp3-kernel-12869
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nFor the PowerPC64 a new \u0027bigmem\u0027 flavor has been added to support big Power machines. (FATE#319026)\n\nThe following security bugs were fixed:\n\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for remote attackers to hijack TCP sessions via a blind in-window attack (bnc#989152).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104 bsc#922947 bsc#968014).\n\nThe following non-security bugs were fixed:\n\n- ahci: Order SATA device IDs for codename Lewisburg (fate#319286).\n- ahci: Remove obsolete Intel Lewisburg SATA RAID device IDs (fate#319286).\n- alsa: hda - Add Intel Lewisburg device IDs Audio (fate#319286).\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- avoid dentry crash triggered by NFS (bsc#984194).\n- bigmem: Add switch to configure bigmem patches (bsc#928138,fate#319026).\n- blktap2: eliminate deadlock potential from shutdown path (bsc#909994).\n- blktap2: eliminate race from deferred work queue handling (bsc#911687).\n- bnx2x: fix lockdep splat (bsc#908684 FATE#317539).\n- bonding: always set recv_probe to bond_arp_rcv in arp monitor (bsc#977687).\n- bonding: fix bond_arp_rcv setting and arp validate desync state (bsc#977687).\n- btrfs: account for non-CoW\u0027d blocks in btrfs_abort_transaction (bsc#983619).\n- btrfs: ensure that file descriptor used with subvol ioctls is a dir (bsc#999600).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- config.conf: add bigmem flavour on ppc64\n- cpumask, nodemask: implement cpumask/nodemask_pr_args() (bnc1003866).\n- cxgb4: Set VPD size so we can read both VPD structures (bsc#976867).\n- dm space map metadata: fix sm_bootstrap_get_nr_blocks() (FATE#313903).\n- dm thin: fix race condition when destroying thin pool workqueue (FATE#313903).\n- drivers: hv: vmbus: avoid scheduling in interrupt context in vmbus_initiate_unload() (bnc#986337).\n- drivers: hv: vmbus: avoid wait_for_completion() on crash (bnc#986337).\n- drivers: hv: vmbus: do not loose HVMSG_TIMER_EXPIRED messages (bnc#986337).\n- drivers: hv: vmbus: do not send CHANNELMSG_UNLOAD on pre-Win2012R2 hosts (bnc#986337).\n- drivers: hv: vmbus: handle various crash scenarios (bnc#986337).\n- drivers: hv: vmbus: remove code duplication in message handling (bnc#986337).\n- drivers: hv: vss: run only on supported host versions (bnc#986337).\n- fs/cifs: cifs_get_root shouldn\u0027t use path with tree name (bsc#963655, bsc#979681).\n- fs/cifs: Compare prepaths when comparing superblocks (bsc#799133).\n- fs/cifs: Fix memory leaks in cifs_do_mount() (bsc#799133).\n- fs/cifs: Fix regression which breaks DFS mounting (bsc#799133).\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- fs/cifs: make share unaccessible at root level mountable (bsc#799133).\n- fs/cifs: Move check for prefix path to within cifs_get_root() (bsc#799133).\n- fs/select: add vmalloc fallback for select(2) (bsc#1000189).\n- hv: do not lose pending heartbeat vmbus packets (bnc#1006919).\n- i2c: i801: add Intel Lewisburg device IDs (fate#319286).\n- i40e: fix an uninitialized variable bug (bsc#909484 FATE#317397).\n- include/linux/mmdebug.h: should include linux/bug.h (bnc#971975 VM performance -- git fixes).\n- increase CONFIG_NR_IRQS 512 -\u003e 2048 reportedly irq error with multiple nvme and tg3 in the same machine is resolved by increasing CONFIG_NR_IRQS (bsc#998399)\n- introduce SIZE_MAX (bsc#1000189).\n- ipv6: replacing a rt6_info needs to purge possible propagated rt6_infos too (bsc#865783).\n- kabi: Import kabi files from 3.0.101-80\n- kabi-fix for flock_owner addition (bsc#998689).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: only channel 0 of the i8254 is linked to the HPET (bsc#960689).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- libata: support the ata host which implements a queue depth less than 32 (bsc#871728)\n- libfc: sanity check cpu number extracted from xid (bsc#988440).\n- lib/vsprintf: implement bitmap printing through \u0027%*pb[l]\u0027 (bnc#1003866).\n- lpfc: call lpfc_sli_validate_fcp_iocb() with the hbalock held (bsc#951392).\n- bigmem: make bigmem patches configurable (bsc#928138,fate#319026).\n- md: check command validity early in md_ioctl() (bsc#1004520).\n- md: Drop sending a change uevent when stopping (bsc#1003568).\n- md: fix problem when adding device to read-only array with bitmap (bnc#771065).\n- md: lockless I/O submission for RAID1 (bsc#982783).\n- md/raid10: always set reshape_safe when initializing reshape_position (fate#311379).\n- md/raid10: Fix memory leak when raid10 reshape completes (fate#311379).\n- mm: fix sleeping function warning from __put_anon_vma (bnc#1005857).\n- mm/memory.c: actually remap enough memory (bnc#1005903).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mm, vmscan: Do not wait for page writeback for GFP_NOFS allocations (bnc#763198).\n- Move patches that create ppc64-bigmem to the powerpc section. Add comments that outline the procedure and warn the unsuspecting.\n- move the call of __d_drop(anon) into __d_materialise_unique(dentry, anon) (bsc#984194).\n- mpt2sas, mpt3sas: Fix panic when aer correct error occurred (bsc#997708).\n- mshyperv: fix recognition of Hyper-V guest crash MSR\u0027s (bnc#986337).\n- net: add pfmemalloc check in sk_add_backlog() (bnc#920016).\n- netback: fix flipping mode (bsc#996664).\n- netfilter: ipv4: defrag: set local_df flag on defragmented skb (bsc#907611).\n- netvsc: fix incorrect receive checksum offloading (bnc#1006917).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261).\n- nfs: Do not drop directory dentry which is in use (bsc#993127).\n- nfs: Do not write enable new pages while an invalidation is proceeding (bsc#999584).\n- nfs: Fix an LOCK/OPEN race when unlinking an open file (bsc#956514).\n- nfs: Fix a regression in the read() syscall (bsc#999584).\n- nfs: Fix races in nfs_revalidate_mapping (bsc#999584).\n- nfs: fix the handling of NFS_INO_INVALID_DATA flag in nfs_revalidate_mapping (bsc#999584).\n- nfs: Fix writeback performance issue on cache invalidation (bsc#999584).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4.1: Fix an NFSv4.1 state renewal regression (bnc#863873).\n- nfsv4: add flock_owner to open context (bnc#998689).\n- nfsv4: change nfs4_do_setattr to take an open_context instead of a nfs4_state (bnc#998689).\n- nfsv4: change nfs4_select_rw_stateid to take a lock_context inplace of lock_owner (bnc#998689).\n- nfsv4: do not check MAY_WRITE access bit in OPEN (bsc#985206).\n- nfsv4: enhance nfs4_copy_lock_stateid to use a flock stateid if there is one (bnc#998689).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595).\n- nfsv4: Fix range checking in __nfs4_get_acl_uncached and __nfs4_proc_set_acl (bsc#982218).\n- oom: print nodemask in the oom report (bnc#1003866).\n- pci: Add pci_set_vpd_size() to set VPD size (bsc#976867).\n- pciback: fix conf_space read/write overlap check.\n- pciback: return proper values during BAR sizing.\n- pci_ids: Add PCI device ID functions 3 and 4 for newer F15h models (fate#321400).\n- pm / hibernate: Fix rtree_next_node() to avoid walking off list ends (bnc#860441).\n- powerpc/64: Fix incorrect return value from __copy_tofrom_user (bsc#1005896).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: add kernel parameter iommu_alloc_quiet (bsc#994926).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: blacklist fixes for unsupported subarchitectures ppc32 only: 6e0fdf9af216 powerpc: fix typo \u0027CONFIG_PMAC\u0027 obscure hardware: f7e9e3583625 powerpc: Fix missing L2 cache size in /sys/devices/system/cpu\n- powerpc: Build fix for powerpc KVM (bsc#928138,fate#319026).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Make VSID_BITS* dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Add 64TB support (bsc#928138,fate#319026).\n- powerpc/mm: Change the swap encoding in pte (bsc#973203).\n- powerpc/mm: Convert virtual address to vpn (bsc#928138,fate#319026).\n- powerpc/mm: Fix hash computation function (bsc#928138,fate#319026).\n- powerpc/mm: Increase the slice range to 64TB (bsc#928138,fate#319026).\n- powerpc/mm: Make KERN_VIRT_SIZE not dependend on PGTABLE_RANGE (bsc#928138,fate#319026).\n- powerpc/mm: Make some of the PGTABLE_RANGE dependency explicit (bsc#928138,fate#319026).\n- powerpc/mm: Replace open coded CONTEXT_BITS value (bsc#928138,fate#319026).\n- powerpc/mm: Simplify hpte_decode (bsc#928138,fate#319026).\n- powerpc/mm: Update VSID allocation documentation (bsc#928138,fate#319026).\n- powerpc/mm: Use 32bit array for slb cache (bsc#928138,fate#319026).\n- powerpc/mm: Use hpt_va to compute virtual address (bsc#928138,fate#319026).\n- powerpc/mm: Use the required number of VSID bits in slbmte (bsc#928138,fate#319026).\n- powerpc: Move kdump default base address to half RMO size on 64bit (bsc#1003344).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Rename USER_ESID_BITS* to ESID_BITS* (bsc#928138,fate#319026).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- powerpc: Update kernel VSID range (bsc#928138,fate#319026).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qlcnic: fix a timeout loop (bsc#909350 FATE#317546)\n- random32: add prandom_u32_max (bsc#989152).\n- remove problematic preprocessor constructs (bsc#928138,fate#319026).\n- REVERT fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- rpm/constraints.in: Bump x86 disk space requirement to 20GB Clamav tends to run out of space nowadays.\n- rpm/package-descriptions: add -bigmem description\n- s390/cio: fix accidental interrupt enabling during resume (bnc#1003677, LTC#147606).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/time: LPAR offset handling (bnc#1003677, LTC#146920).\n- s390/time: move PTFF definitions (bnc#1003677, LTC#146920).\n- sata: Adding Intel Lewisburg device IDs for SATA (fate#319286).\n- sched/core: Fix an SMP ordering race in try_to_wake_up() vs. schedule() (bnc#1001419).\n- sched/core: Fix a race between try_to_wake_up() and a woken up task (bnc#1002165).\n- sched: Fix possible divide by zero in avg_atom() calculation (bsc#996329).\n- scripts/bigmem-generate-ifdef-guard: auto-regen patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM\n- scripts/bigmem-generate-ifdef-guard: Include this script to regenerate patches.suse/ppc64-bigmem-introduce-CONFIG_BIGMEM\n- scripts/bigmem-generate-ifdef-guard: make executable\n- scsi_dh_rdac: retry inquiry for UNIT ATTENTION (bsc#934760).\n- scsi: do not print \u0027reservation conflict\u0027 for TEST UNIT READY (bsc#984102).\n- scsi: ibmvfc: add FC Class 3 Error Recovery support (bsc#984992).\n- scsi: ibmvfc: Fix I/O hang when port is not mapped (bsc#971989)\n- scsi: ibmvfc: Set READ FCP_XFER_READY DISABLED bit in PRLI (bsc#984992).\n- scsi_scan: Send TEST UNIT READY to LUN0 before LUN scanning (bnc#843236,bsc#989779).\n- scsi: zfcp: spin_lock_irqsave() is not nestable (bsc#1003677,LTC#147374).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- sfc: on MC reset, clear PIO buffer linkage in TXQs (bsc#909618 FATE#317521).\n- sort hyperv patches properly in series.conf\n- sunrpc/cache: drop reference when sunrpc_cache_pipe_upcall() detects a race (bnc#803320).\n- tg3: Avoid NULL pointer dereference in tg3_io_error_detected() (bsc#908458 FATE#317507).\n- tmpfs: change final i_blocks BUG to WARNING (bsc#991923).\n- tty: Signal SIGHUP before hanging up ldisc (bnc#989764).\n- Update patches.xen/xen3-auto-arch-x86.diff (bsc#929141, a.o.).\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: hub: Fix auto-remount of safely removed or ejected USB-3 devices (bsc#922634).\n- usb: hub: Fix unbalanced reference count/memory leak/deadlocks (bsc#968010).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n- vlan: do not deliver frames for unknown vlans to protocols (bsc#979514).\n- vlan: mask vlan prio bits (bsc#979514).\n- vmxnet3: Wake queue from reset work (bsc#999907).\n- x86, amd_nb: Clarify F15h, model 30h GART and L3 support (fate#321400).\n- x86/asm/traps: Disable tracing and kprobes in fixup_bad_iret and sync_regs (bsc#909077).\n- x86/cpu/amd: Set X86_FEATURE_EXTD_APICID for future processors (fate#321400).\n- x86/gart: Check for GART support before accessing GART registers (fate#321400).\n- x86/MCE/intel: Cleanup CMCI storm logic (bsc#929141).\n- xenbus: inspect the correct type in xenbus_dev_request_and_reply().\n- xen: x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: Silence warnings in xfs_vm_releasepage() (bnc#915183 bsc#987565).\n- zfcp: close window with unblocked rport during rport gone (bnc#1003677, LTC#144310).\n- zfcp: fix D_ID field with actual value on tracing SAN responses (bnc#1003677, LTC#144312).\n- zfcp: fix ELS/GS request\u0026response length for hardware data router (bnc#1003677, LTC#144308).\n- zfcp: fix payload trace length for SAN request\u0026response (bnc#1003677, LTC#144312).\n- zfcp: restore: Dont use 0 to indicate invalid LUN in rec trace (bnc#1003677, LTC#144312).\n- zfcp: restore tracing of handle for port and LUN with HBA records (bnc#1003677, LTC#144312).\n- zfcp: retain trace level for SCSI and HBA FSF response records (bnc#1003677, LTC#144312).\n- zfcp: trace full payload of all SAN records (req,resp,iels) (bnc#1003677, LTC#144312).\n- zfcp: trace on request for open and close of WKA port (bnc#1003677, LTC#144312).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-12869,slessp4-kernel-12869,slexsp3-kernel-12869", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2976-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2976-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162976-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2976-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-December/002439.html" }, { "category": "self", "summary": "SUSE Bug 1000189", "url": "https://bugzilla.suse.com/1000189" }, { "category": "self", "summary": "SUSE Bug 1001419", "url": "https://bugzilla.suse.com/1001419" }, { "category": "self", "summary": "SUSE Bug 1002165", "url": "https://bugzilla.suse.com/1002165" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003344", "url": "https://bugzilla.suse.com/1003344" }, { "category": "self", "summary": "SUSE Bug 1003568", "url": "https://bugzilla.suse.com/1003568" }, { "category": "self", "summary": "SUSE Bug 1003677", "url": "https://bugzilla.suse.com/1003677" }, { "category": "self", "summary": "SUSE Bug 1003866", "url": "https://bugzilla.suse.com/1003866" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1004520", "url": "https://bugzilla.suse.com/1004520" }, { "category": "self", "summary": "SUSE Bug 1005857", "url": "https://bugzilla.suse.com/1005857" }, { "category": "self", "summary": "SUSE Bug 1005896", "url": "https://bugzilla.suse.com/1005896" }, { "category": "self", "summary": "SUSE Bug 1005903", "url": "https://bugzilla.suse.com/1005903" }, { "category": "self", "summary": "SUSE Bug 1006917", "url": "https://bugzilla.suse.com/1006917" }, { "category": "self", "summary": "SUSE Bug 1006919", "url": "https://bugzilla.suse.com/1006919" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 763198", "url": "https://bugzilla.suse.com/763198" }, { "category": "self", "summary": "SUSE Bug 771065", "url": "https://bugzilla.suse.com/771065" }, { "category": "self", "summary": "SUSE Bug 799133", "url": "https://bugzilla.suse.com/799133" }, { "category": "self", "summary": "SUSE Bug 803320", "url": "https://bugzilla.suse.com/803320" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 843236", "url": "https://bugzilla.suse.com/843236" }, { "category": "self", "summary": "SUSE Bug 860441", "url": "https://bugzilla.suse.com/860441" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 865783", "url": "https://bugzilla.suse.com/865783" }, { "category": "self", "summary": "SUSE Bug 871728", "url": "https://bugzilla.suse.com/871728" }, { "category": "self", "summary": "SUSE Bug 907611", "url": "https://bugzilla.suse.com/907611" }, { "category": "self", "summary": "SUSE Bug 908458", "url": "https://bugzilla.suse.com/908458" }, { "category": "self", "summary": "SUSE Bug 908684", "url": "https://bugzilla.suse.com/908684" }, { "category": "self", "summary": "SUSE Bug 909077", "url": "https://bugzilla.suse.com/909077" }, { "category": "self", "summary": "SUSE Bug 909350", "url": "https://bugzilla.suse.com/909350" }, { "category": "self", "summary": "SUSE Bug 909484", "url": "https://bugzilla.suse.com/909484" }, { "category": "self", "summary": "SUSE Bug 909618", "url": "https://bugzilla.suse.com/909618" }, { "category": "self", "summary": "SUSE Bug 909994", "url": "https://bugzilla.suse.com/909994" }, { "category": "self", "summary": "SUSE Bug 911687", "url": "https://bugzilla.suse.com/911687" }, { "category": "self", "summary": "SUSE Bug 915183", "url": "https://bugzilla.suse.com/915183" }, { "category": "self", "summary": "SUSE Bug 920016", "url": "https://bugzilla.suse.com/920016" }, { "category": "self", "summary": "SUSE Bug 922634", "url": "https://bugzilla.suse.com/922634" }, { "category": "self", "summary": "SUSE Bug 922947", "url": "https://bugzilla.suse.com/922947" }, { "category": "self", "summary": "SUSE Bug 928138", "url": "https://bugzilla.suse.com/928138" }, { "category": "self", "summary": "SUSE Bug 929141", "url": "https://bugzilla.suse.com/929141" }, { "category": "self", "summary": "SUSE Bug 934760", "url": "https://bugzilla.suse.com/934760" }, { "category": "self", "summary": "SUSE Bug 951392", "url": "https://bugzilla.suse.com/951392" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968010", "url": "https://bugzilla.suse.com/968010" }, { "category": "self", "summary": "SUSE Bug 968014", "url": "https://bugzilla.suse.com/968014" }, { "category": "self", "summary": "SUSE Bug 971975", "url": "https://bugzilla.suse.com/971975" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 973203", "url": "https://bugzilla.suse.com/973203" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 976867", "url": "https://bugzilla.suse.com/976867" }, { "category": "self", "summary": "SUSE Bug 977687", "url": "https://bugzilla.suse.com/977687" }, { "category": "self", "summary": "SUSE Bug 979514", "url": "https://bugzilla.suse.com/979514" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 982218", "url": "https://bugzilla.suse.com/982218" }, { "category": "self", "summary": "SUSE Bug 982783", "url": "https://bugzilla.suse.com/982783" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 983619", "url": "https://bugzilla.suse.com/983619" }, { "category": "self", "summary": "SUSE Bug 984102", "url": "https://bugzilla.suse.com/984102" }, { "category": "self", "summary": "SUSE Bug 984194", "url": "https://bugzilla.suse.com/984194" }, { "category": "self", "summary": "SUSE Bug 984992", "url": "https://bugzilla.suse.com/984992" }, { "category": "self", "summary": "SUSE Bug 985206", "url": "https://bugzilla.suse.com/985206" }, { "category": "self", "summary": "SUSE Bug 986337", "url": "https://bugzilla.suse.com/986337" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 987565", "url": "https://bugzilla.suse.com/987565" }, { "category": "self", "summary": "SUSE Bug 988440", "url": "https://bugzilla.suse.com/988440" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 989764", "url": "https://bugzilla.suse.com/989764" }, { "category": "self", "summary": "SUSE Bug 989779", "url": "https://bugzilla.suse.com/989779" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 991923", "url": "https://bugzilla.suse.com/991923" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993127", "url": "https://bugzilla.suse.com/993127" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 994926", "url": "https://bugzilla.suse.com/994926" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 996329", "url": "https://bugzilla.suse.com/996329" }, { "category": "self", "summary": "SUSE Bug 996664", "url": "https://bugzilla.suse.com/996664" }, { "category": "self", "summary": "SUSE Bug 997708", "url": "https://bugzilla.suse.com/997708" }, { "category": "self", "summary": "SUSE Bug 998399", "url": "https://bugzilla.suse.com/998399" }, { "category": "self", "summary": "SUSE Bug 998689", "url": "https://bugzilla.suse.com/998689" }, { "category": "self", "summary": "SUSE Bug 999584", "url": "https://bugzilla.suse.com/999584" }, { "category": "self", "summary": "SUSE Bug 999600", "url": "https://bugzilla.suse.com/999600" }, { "category": "self", "summary": "SUSE Bug 999907", "url": "https://bugzilla.suse.com/999907" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-12-02T11:04:24Z", "generator": { "date": "2016-12-02T11:04:24Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2976-1", "initial_release_date": "2016-12-02T11:04:24Z", "revision_history": [ { "date": "2016-12-02T11:04:24Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.i586", "product": { "name": "kernel-default-3.0.101-88.1.i586", "product_id": "kernel-default-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.i586", "product": { "name": "kernel-default-base-3.0.101-88.1.i586", "product_id": "kernel-default-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.i586", "product": { "name": "kernel-default-devel-3.0.101-88.1.i586", "product_id": "kernel-default-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-3.0.101-88.1.i586", "product_id": "kernel-ec2-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-88.1.i586", "product_id": "kernel-ec2-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-88.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-88.1.i586", "product_id": "kernel-ec2-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-88.1.i586", "product": { "name": "kernel-pae-3.0.101-88.1.i586", "product_id": "kernel-pae-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-88.1.i586", "product": { "name": "kernel-pae-base-3.0.101-88.1.i586", "product_id": "kernel-pae-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-88.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-88.1.i586", "product_id": "kernel-pae-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.i586", "product": { "name": "kernel-source-3.0.101-88.1.i586", "product_id": "kernel-source-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.i586", "product": { "name": "kernel-syms-3.0.101-88.1.i586", "product_id": "kernel-syms-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.i586", "product": { "name": "kernel-trace-3.0.101-88.1.i586", "product_id": "kernel-trace-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.i586", "product": { "name": "kernel-trace-base-3.0.101-88.1.i586", "product_id": "kernel-trace-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-88.1.i586", "product_id": "kernel-trace-devel-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-88.1.i586", "product": { "name": "kernel-xen-3.0.101-88.1.i586", "product_id": "kernel-xen-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-88.1.i586", "product": { "name": "kernel-xen-base-3.0.101-88.1.i586", "product_id": "kernel-xen-base-3.0.101-88.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-88.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-88.1.i586", "product_id": "kernel-xen-devel-3.0.101-88.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.ia64", "product": { "name": "kernel-default-3.0.101-88.1.ia64", "product_id": "kernel-default-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.ia64", "product": { "name": "kernel-default-base-3.0.101-88.1.ia64", "product_id": "kernel-default-base-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-88.1.ia64", "product_id": "kernel-default-devel-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.ia64", "product": { "name": "kernel-source-3.0.101-88.1.ia64", "product_id": "kernel-source-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.ia64", "product": { "name": "kernel-syms-3.0.101-88.1.ia64", "product_id": "kernel-syms-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-3.0.101-88.1.ia64", "product_id": "kernel-trace-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-88.1.ia64", "product_id": "kernel-trace-base-3.0.101-88.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.ia64", "product_id": "kernel-trace-devel-3.0.101-88.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-88.3.noarch", "product": { "name": "kernel-docs-3.0.101-88.3.noarch", "product_id": "kernel-docs-3.0.101-88.3.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-3.0.101-88.1.ppc64", "product_id": "kernel-default-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-88.1.ppc64", "product_id": "kernel-default-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-88.1.ppc64", "product_id": "kernel-default-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.ppc64", "product": { "name": "kernel-source-3.0.101-88.1.ppc64", "product_id": "kernel-source-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.ppc64", "product": { "name": "kernel-syms-3.0.101-88.1.ppc64", "product_id": "kernel-syms-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-3.0.101-88.1.ppc64", "product_id": "kernel-trace-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-88.1.ppc64", "product_id": "kernel-trace-base-3.0.101-88.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-88.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.s390x", "product": { "name": "kernel-default-3.0.101-88.1.s390x", "product_id": "kernel-default-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.s390x", "product": { "name": "kernel-default-base-3.0.101-88.1.s390x", "product_id": "kernel-default-base-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-88.1.s390x", "product_id": "kernel-default-devel-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-88.1.s390x", "product": { "name": "kernel-default-man-3.0.101-88.1.s390x", "product_id": "kernel-default-man-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.s390x", "product": { "name": "kernel-source-3.0.101-88.1.s390x", "product_id": "kernel-source-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.s390x", "product": { "name": "kernel-syms-3.0.101-88.1.s390x", "product_id": "kernel-syms-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-3.0.101-88.1.s390x", "product_id": "kernel-trace-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-88.1.s390x", "product_id": "kernel-trace-base-3.0.101-88.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-88.1.s390x", "product_id": "kernel-trace-devel-3.0.101-88.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-3.0.101-88.1.x86_64", "product_id": "kernel-default-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-88.1.x86_64", "product_id": "kernel-default-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-88.1.x86_64", "product_id": "kernel-default-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-88.1.x86_64", "product": { "name": "kernel-source-3.0.101-88.1.x86_64", "product_id": "kernel-source-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-88.1.x86_64", "product": { "name": "kernel-syms-3.0.101-88.1.x86_64", "product_id": "kernel-syms-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-3.0.101-88.1.x86_64", "product_id": "kernel-trace-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-88.1.x86_64", "product_id": "kernel-trace-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-3.0.101-88.1.x86_64", "product_id": "kernel-xen-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-88.1.x86_64", "product_id": "kernel-xen-base-3.0.101-88.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-88.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-88.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-88.3.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" }, "product_reference": "kernel-docs-3.0.101-88.3.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586" }, "product_reference": "kernel-default-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586" }, "product_reference": "kernel-default-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586" }, "product_reference": "kernel-source-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64" }, "product_reference": "kernel-source-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64" }, "product_reference": "kernel-source-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x" }, "product_reference": "kernel-source-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64" }, "product_reference": "kernel-source-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586" }, "product_reference": "kernel-syms-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64" }, "product_reference": "kernel-syms-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x" }, "product_reference": "kernel-syms-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586" }, "product_reference": "kernel-default-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586" }, "product_reference": "kernel-default-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586" }, "product_reference": "kernel-source-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64" }, "product_reference": "kernel-source-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64" }, "product_reference": "kernel-source-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x" }, "product_reference": "kernel-source-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64" }, "product_reference": "kernel-source-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586" }, "product_reference": "kernel-syms-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64" }, "product_reference": "kernel-syms-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x" }, "product_reference": "kernel-syms-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-88.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-bigmem-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-88.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-88.3.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-12-02T11:04:24Z", "details": "low" } ], "title": "CVE-2016-7425" } ] }
suse-su-2016:2018-1
Vulnerability from csaf_suse
Published
2016-08-09 15:23
Modified
2016-08-09 15:23
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
The following non-security bugs were fixed:
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- bridge: superfluous skb->nfct check in br_nf_dev_queue_xmit (bsc#982544).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
Patchnames
sdksp4-kernel-12685,slessp4-kernel-12685,slexsp3-kernel-12685
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n\nThe following non-security bugs were fixed:\n- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).\n- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).\n- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).\n- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).\n- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).\n- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).\n- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).\n- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).\n- bridge: superfluous skb-\u003enfct check in br_nf_dev_queue_xmit (bsc#982544).\n- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm: Fix DIF failures on ext3 filesystems (bsc#971030).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).\n- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n", "title": "Description of the patch" }, { "category": "details", "text": "sdksp4-kernel-12685,slessp4-kernel-12685,slexsp3-kernel-12685", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2018-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2018-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162018-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2018-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002201.html" }, { "category": "self", "summary": "SUSE Bug 909589", "url": "https://bugzilla.suse.com/909589" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 971030", "url": "https://bugzilla.suse.com/971030" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-09T15:23:23Z", "generator": { "date": "2016-08-09T15:23:23Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2018-1", "initial_release_date": "2016-08-09T15:23:23Z", "revision_history": [ { "date": "2016-08-09T15:23:23Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-80.1.i586", "product": { "name": "kernel-default-3.0.101-80.1.i586", "product_id": "kernel-default-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-80.1.i586", "product": { "name": "kernel-default-base-3.0.101-80.1.i586", "product_id": "kernel-default-base-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-80.1.i586", "product": { "name": "kernel-default-devel-3.0.101-80.1.i586", "product_id": "kernel-default-devel-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-80.1.i586", "product": { "name": "kernel-ec2-3.0.101-80.1.i586", "product_id": "kernel-ec2-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-80.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-80.1.i586", "product_id": "kernel-ec2-base-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-80.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-80.1.i586", "product_id": "kernel-ec2-devel-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-80.1.i586", "product": { "name": "kernel-pae-3.0.101-80.1.i586", "product_id": "kernel-pae-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-80.1.i586", "product": { "name": "kernel-pae-base-3.0.101-80.1.i586", "product_id": "kernel-pae-base-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-80.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-80.1.i586", "product_id": "kernel-pae-devel-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-80.1.i586", "product": { "name": "kernel-source-3.0.101-80.1.i586", "product_id": "kernel-source-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-80.1.i586", "product": { "name": "kernel-syms-3.0.101-80.1.i586", "product_id": "kernel-syms-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-80.1.i586", "product": { "name": "kernel-trace-3.0.101-80.1.i586", "product_id": "kernel-trace-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-80.1.i586", "product": { "name": "kernel-trace-base-3.0.101-80.1.i586", "product_id": "kernel-trace-base-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-80.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-80.1.i586", "product_id": "kernel-trace-devel-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-80.1.i586", "product": { "name": "kernel-xen-3.0.101-80.1.i586", "product_id": "kernel-xen-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-80.1.i586", "product": { "name": "kernel-xen-base-3.0.101-80.1.i586", "product_id": "kernel-xen-base-3.0.101-80.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-80.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-80.1.i586", "product_id": "kernel-xen-devel-3.0.101-80.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-80.1.ia64", "product": { "name": "kernel-default-3.0.101-80.1.ia64", "product_id": "kernel-default-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-80.1.ia64", "product": { "name": "kernel-default-base-3.0.101-80.1.ia64", "product_id": "kernel-default-base-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-80.1.ia64", "product": { "name": "kernel-default-devel-3.0.101-80.1.ia64", "product_id": "kernel-default-devel-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-80.1.ia64", "product": { "name": "kernel-source-3.0.101-80.1.ia64", "product_id": "kernel-source-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-80.1.ia64", "product": { "name": "kernel-syms-3.0.101-80.1.ia64", "product_id": "kernel-syms-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-80.1.ia64", "product": { "name": "kernel-trace-3.0.101-80.1.ia64", "product_id": "kernel-trace-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-80.1.ia64", "product": { "name": "kernel-trace-base-3.0.101-80.1.ia64", "product_id": "kernel-trace-base-3.0.101-80.1.ia64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-80.1.ia64", "product": { "name": "kernel-trace-devel-3.0.101-80.1.ia64", "product_id": "kernel-trace-devel-3.0.101-80.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-docs-3.0.101-80.2.noarch", "product": { "name": "kernel-docs-3.0.101-80.2.noarch", "product_id": "kernel-docs-3.0.101-80.2.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-80.1.ppc64", "product": { "name": "kernel-default-3.0.101-80.1.ppc64", "product_id": "kernel-default-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-80.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-80.1.ppc64", "product_id": "kernel-default-base-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-80.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-80.1.ppc64", "product_id": "kernel-default-devel-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-80.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-80.1.ppc64", "product_id": "kernel-ppc64-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-80.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-80.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-80.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-80.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-80.1.ppc64", "product": { "name": "kernel-source-3.0.101-80.1.ppc64", "product_id": "kernel-source-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-80.1.ppc64", "product": { "name": "kernel-syms-3.0.101-80.1.ppc64", "product_id": "kernel-syms-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-80.1.ppc64", "product": { "name": "kernel-trace-3.0.101-80.1.ppc64", "product_id": "kernel-trace-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-80.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-80.1.ppc64", "product_id": "kernel-trace-base-3.0.101-80.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-80.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-80.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-80.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-80.1.s390x", "product": { "name": "kernel-default-3.0.101-80.1.s390x", "product_id": "kernel-default-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-80.1.s390x", "product": { "name": "kernel-default-base-3.0.101-80.1.s390x", "product_id": "kernel-default-base-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-80.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-80.1.s390x", "product_id": "kernel-default-devel-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-80.1.s390x", "product": { "name": "kernel-default-man-3.0.101-80.1.s390x", "product_id": "kernel-default-man-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-80.1.s390x", "product": { "name": "kernel-source-3.0.101-80.1.s390x", "product_id": "kernel-source-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-80.1.s390x", "product": { "name": "kernel-syms-3.0.101-80.1.s390x", "product_id": "kernel-syms-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-80.1.s390x", "product": { "name": "kernel-trace-3.0.101-80.1.s390x", "product_id": "kernel-trace-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-80.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-80.1.s390x", "product_id": "kernel-trace-base-3.0.101-80.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-80.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-80.1.s390x", "product_id": "kernel-trace-devel-3.0.101-80.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-80.1.x86_64", "product": { "name": "kernel-default-3.0.101-80.1.x86_64", "product_id": "kernel-default-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-80.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-80.1.x86_64", "product_id": "kernel-default-base-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-80.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-80.1.x86_64", "product_id": "kernel-default-devel-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-80.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-80.1.x86_64", "product_id": "kernel-ec2-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-80.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-80.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-80.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-80.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-80.1.x86_64", "product": { "name": "kernel-source-3.0.101-80.1.x86_64", "product_id": "kernel-source-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-80.1.x86_64", "product": { "name": "kernel-syms-3.0.101-80.1.x86_64", "product_id": "kernel-syms-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-80.1.x86_64", "product": { "name": "kernel-trace-3.0.101-80.1.x86_64", "product_id": "kernel-trace-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-80.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-80.1.x86_64", "product_id": "kernel-trace-base-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-80.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-80.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-80.1.x86_64", "product": { "name": "kernel-xen-3.0.101-80.1.x86_64", "product_id": "kernel-xen-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-80.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-80.1.x86_64", "product_id": "kernel-xen-base-3.0.101-80.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-80.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-80.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-80.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:sle-sdk:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4", "product": { "name": "SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.0.101-80.2.noarch as component of SUSE Linux Enterprise Software Development Kit 11 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" }, "product_reference": "kernel-docs-3.0.101-80.2.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586" }, "product_reference": "kernel-default-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586" }, "product_reference": "kernel-default-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586" }, "product_reference": "kernel-source-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64" }, "product_reference": "kernel-source-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64" }, "product_reference": "kernel-source-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x" }, "product_reference": "kernel-source-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64" }, "product_reference": "kernel-source-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586" }, "product_reference": "kernel-syms-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64" }, "product_reference": "kernel-syms-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x" }, "product_reference": "kernel-syms-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4", "product_id": "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586" }, "product_reference": "kernel-default-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586" }, "product_reference": "kernel-default-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-base-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586" }, "product_reference": "kernel-source-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64" }, "product_reference": "kernel-source-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64" }, "product_reference": "kernel-source-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x" }, "product_reference": "kernel-source-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64" }, "product_reference": "kernel-source-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586" }, "product_reference": "kernel-syms-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64" }, "product_reference": "kernel-syms-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x" }, "product_reference": "kernel-syms-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-80.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-80.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-80.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-80.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T15:23:23Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T15:23:23Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-default-man-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ec2-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-pae-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-ppc64-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-source-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-syms-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-trace-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-base-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP4:kernel-xen-devel-3.0.101-80.1.x86_64", "SUSE Linux Enterprise Software Development Kit 11 SP4:kernel-docs-3.0.101-80.2.noarch" ] } ], "threats": [ { "category": "impact", "date": "2016-08-09T15:23:23Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:2245-1
Vulnerability from csaf_suse
Published
2016-09-06 09:28
Modified
2016-09-06 09:28
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability. (bsc#991608)
The following non-security bugs were fixed:
- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).
- Update PCI VPD size patch to upstream:
* PCI: Determine actual VPD size on first access (bsc#971729).
* PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)
- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)
- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).
- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).
- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).
- hid-elo: kill not flush the work.
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- nfs: Do not attempt to decode missing directory entries (bsc#980931).
- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- nfs: reduce access cache shrinker locking (bnc#866130).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).
- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).
- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).
- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).
- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).
- usbhid: more mice with ALWAYS_POLL (bsc#919351).
- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).
- veth: do not modify ip_summed (bsc#969149).
- virtio_scsi: Implement eh_timed_out callback.
- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).
- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).
- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).
- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).
Patchnames
sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-3955: The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel allowed remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet (bnc#975945).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bnc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure was initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n- CVE-2016-5696: net/ipv4/tcp_input.c in the Linux kernel did not properly determine the rate of challenge ACK segments, which made it easier for man-in-the-middle attackers to hijack TCP sessions via a blind in-window attack. (bsc#989152)\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability. (bsc#991608)\n\nThe following non-security bugs were fixed:\n- Update patches.fixes/pci-determine-actual-vpd-size-on-first-access.patch (bsc#971729, bsc#974428).\n- Update PCI VPD size patch to upstream: \n * PCI: Determine actual VPD size on first access (bsc#971729). \n * PCI: Update VPD definitions (bsc#971729). (cherry picked from commit d2af5b7e0cd7ee2a54f02ad65ec300d16b3ad956)\n- Update patches.fixes/pci-update-vpd-definitions.patch (bsc#971729, bsc#974428).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- fs/cifs: Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- fs/cifs: fix wrongly prefixed path to root (bsc#963655, bsc#979681)\n- hid: add ALWAYS_POLL quirk for a Logitech 0xc055 (bnc#962404).\n- hid: add HP OEM mouse to quirk ALWAYS_POLL (bsc#919351).\n- hid: add quirk for PIXART OEM mouse used by HP (bsc#919351).\n- hid-elo: kill not flush the work.\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- nfs: Do not attempt to decode missing directory entries (bsc#980931).\n- nfs: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- nfs: reduce access cache shrinker locking (bnc#866130).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- s390/cio: collect format 1 channel-path description data (bsc#966460,LTC#136434).\n- s390/cio: ensure consistent measurement state (bsc#966460,LTC#136434).\n- s390/cio: fix measurement characteristics memleak (bsc#966460,LTC#136434).\n- s390/cio: update measurement characteristics (bsc#966460,LTC#136434).\n- usbhid: add device USB_DEVICE_ID_LOGITECH_C077 (bsc#919351).\n- usbhid: more mice with ALWAYS_POLL (bsc#919351).\n- usbhid: yet another mouse with ALWAYS_POLL (bsc#919351).\n- veth: do not modify ip_summed (bsc#969149).\n- virtio_scsi: Implement eh_timed_out callback.\n- vmxnet3: segCnt can be 1 for LRO packets (bsc#988065).\n- xfs: Avoid grabbing ilock when file size is not changed (bsc#983535).\n- xfs: avoid xfs_buf hang in lookup node directory corruption (bsc#989401).\n- xfs: only update the last_sync_lsn when a transaction completes (bsc#987709).\n", "title": "Description of the patch" }, { "category": "details", "text": "sleclo50sp3-kernel-12730,sleman21-kernel-12730,slemap21-kernel-12730,sleposp3-kernel-12730,slessp3-kernel-12730,slexsp3-kernel-12730", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2245-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2245-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162245-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2245-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-September/002255.html" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 919351", "url": "https://bugzilla.suse.com/919351" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 962404", "url": "https://bugzilla.suse.com/962404" }, { "category": "self", "summary": "SUSE Bug 963655", "url": "https://bugzilla.suse.com/963655" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 966460", "url": "https://bugzilla.suse.com/966460" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971729", "url": "https://bugzilla.suse.com/971729" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 974428", "url": "https://bugzilla.suse.com/974428" }, { "category": "self", "summary": "SUSE Bug 975945", "url": "https://bugzilla.suse.com/975945" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979681", "url": "https://bugzilla.suse.com/979681" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983535", "url": "https://bugzilla.suse.com/983535" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 987709", "url": "https://bugzilla.suse.com/987709" }, { "category": "self", "summary": "SUSE Bug 988065", "url": "https://bugzilla.suse.com/988065" }, { "category": "self", "summary": "SUSE Bug 989152", "url": "https://bugzilla.suse.com/989152" }, { "category": "self", "summary": "SUSE Bug 989401", "url": "https://bugzilla.suse.com/989401" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3955 page", "url": "https://www.suse.com/security/cve/CVE-2016-3955/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5696 page", "url": "https://www.suse.com/security/cve/CVE-2016-5696/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-09-06T09:28:39Z", "generator": { "date": "2016-09-06T09:28:39Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2245-1", "initial_release_date": "2016-09-06T09:28:39Z", "revision_history": [ { "date": "2016-09-06T09:28:39Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-source-3.0.101-0.47.86.1.i586", "product_id": "kernel-source-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.i586", "product_id": "kernel-syms-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x", "product_id": "kernel-default-man-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-source-3.0.101-0.47.86.1.s390x", "product_id": "kernel-source-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x", "product_id": "kernel-syms-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-source-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-syms-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.47.86.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 5", "product": { "name": "SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5", "product_identification_helper": { "cpe": "cpe:/o:suse:cloud:5" } } }, { "category": "product_name", "name": "SUSE Manager 2.1", "product": { "name": "SUSE Manager 2.1", "product_id": "SUSE Manager 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-server:2.1" } } }, { "category": "product_name", "name": "SUSE Manager Proxy 2.1", "product": { "name": "SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-manager-proxy:2.1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product": { "name": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-pos:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE OpenStack Cloud 5", "product_id": "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 5" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager 2.1", "product_id": "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Manager Proxy 2.1", "product_id": "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Manager Proxy 2.1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3", "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3955" } ], "notes": [ { "category": "general", "text": "The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3955", "url": "https://www.suse.com/security/cve/CVE-2016-3955" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3955", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 975945 for CVE-2016-3955", "url": "https://bugzilla.suse.com/975945" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-3955", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-3955" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5696", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5696" } ], "notes": [ { "category": "general", "text": "net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5696", "url": "https://www.suse.com/security/cve/CVE-2016-5696" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1175721 for CVE-2016-5696", "url": "https://bugzilla.suse.com/1175721" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2016-5696", "url": "https://bugzilla.suse.com/989152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5696" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Point of Sale 11 SP3:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-pae-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.i586", "SUSE Linux Enterprise Server 11 SP3-LTSS:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-default-man-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.s390x", "SUSE Manager 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE Manager Proxy 2.1:kernel-xen-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-bigsmp-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-default-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-ec2-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-source-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-syms-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-trace-devel-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-base-3.0.101-0.47.86.1.x86_64", "SUSE OpenStack Cloud 5:kernel-xen-devel-3.0.101-0.47.86.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-09-06T09:28:39Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:1709-1
Vulnerability from csaf_suse
Published
2016-06-30 15:27
Modified
2016-06-30 15:27
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes.
Security issue fixed:
- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)
The following non-security bugs were fixed:
- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).
- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).
- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).
- target/rbd: do not put snap_context twice (bsc#981143).
- target/rbd: remove caw_mutex usage (bsc#981143).
Patchnames
SUSE-SLE-DESKTOP-12-SP1-2016-1012,SUSE-SLE-Live-Patching-12-2016-1012,SUSE-SLE-Module-Public-Cloud-12-2016-1012,SUSE-SLE-SDK-12-SP1-2016-1012,SUSE-SLE-SERVER-12-SP1-2016-1012,SUSE-SLE-WE-12-SP1-2016-1012
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 12 kernel was updated to receive critical security and bugfixes.\n\nSecurity issue fixed:\n- CVE-2016-4997: A buffer overflow in 32bit compat_setsockopt iptables handling could lead to a local privilege escalation. (bsc#986362)\n\nThe following non-security bugs were fixed:\n- KVM: x86: expose invariant tsc cpuid bit (v2) (bsc#971770).\n- block: do not check request size in blk_cloned_rq_check_limits() (bsc#972124).\n- rbd: handle OBJ_REQUEST_SG types for copyup (bsc#983394).\n- target/rbd: do not put snap_context twice (bsc#981143).\n- target/rbd: remove caw_mutex usage (bsc#981143).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-DESKTOP-12-SP1-2016-1012,SUSE-SLE-Live-Patching-12-2016-1012,SUSE-SLE-Module-Public-Cloud-12-2016-1012,SUSE-SLE-SDK-12-SP1-2016-1012,SUSE-SLE-SERVER-12-SP1-2016-1012,SUSE-SLE-WE-12-SP1-2016-1012", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1709-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1709-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161709-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1709-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-June/002143.html" }, { "category": "self", "summary": "SUSE Bug 971770", "url": "https://bugzilla.suse.com/971770" }, { "category": "self", "summary": "SUSE Bug 972124", "url": "https://bugzilla.suse.com/972124" }, { "category": "self", "summary": "SUSE Bug 981143", "url": "https://bugzilla.suse.com/981143" }, { "category": "self", "summary": "SUSE Bug 983394", "url": "https://bugzilla.suse.com/983394" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-06-30T15:27:48Z", "generator": { "date": "2016-06-30T15:27:48Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1709-1", "initial_release_date": "2016-06-30T15:27:48Z", "revision_history": [ { "date": "2016-06-30T15:27:48Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.59-60.45.1.noarch", "product": { "name": "kernel-devel-3.12.59-60.45.1.noarch", "product_id": "kernel-devel-3.12.59-60.45.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.59-60.45.1.noarch", "product": { "name": "kernel-macros-3.12.59-60.45.1.noarch", "product_id": "kernel-macros-3.12.59-60.45.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.59-60.45.1.noarch", "product": { "name": "kernel-source-3.12.59-60.45.1.noarch", "product_id": "kernel-source-3.12.59-60.45.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.59-60.45.4.noarch", "product": { "name": "kernel-docs-3.12.59-60.45.4.noarch", "product_id": "kernel-docs-3.12.59-60.45.4.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.45.3.ppc64le", "product": { "name": "kernel-obs-build-3.12.59-60.45.3.ppc64le", "product_id": "kernel-obs-build-3.12.59-60.45.3.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.59-60.45.2.ppc64le", "product": { "name": "kernel-default-3.12.59-60.45.2.ppc64le", "product_id": "kernel-default-3.12.59-60.45.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.45.2.ppc64le", "product": { "name": "kernel-default-base-3.12.59-60.45.2.ppc64le", "product_id": "kernel-default-base-3.12.59-60.45.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.45.2.ppc64le", "product": { "name": "kernel-default-devel-3.12.59-60.45.2.ppc64le", "product_id": "kernel-default-devel-3.12.59-60.45.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.45.1.ppc64le", "product": { "name": "kernel-syms-3.12.59-60.45.1.ppc64le", "product_id": "kernel-syms-3.12.59-60.45.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.45.3.s390x", "product": { "name": "kernel-obs-build-3.12.59-60.45.3.s390x", "product_id": "kernel-obs-build-3.12.59-60.45.3.s390x" } }, { "category": "product_version", "name": "kernel-default-3.12.59-60.45.2.s390x", "product": { "name": "kernel-default-3.12.59-60.45.2.s390x", "product_id": "kernel-default-3.12.59-60.45.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.45.2.s390x", "product": { "name": "kernel-default-base-3.12.59-60.45.2.s390x", "product_id": "kernel-default-base-3.12.59-60.45.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.45.2.s390x", "product": { "name": "kernel-default-devel-3.12.59-60.45.2.s390x", "product_id": "kernel-default-devel-3.12.59-60.45.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.59-60.45.2.s390x", "product": { "name": "kernel-default-man-3.12.59-60.45.2.s390x", "product_id": "kernel-default-man-3.12.59-60.45.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.45.1.s390x", "product": { "name": "kernel-syms-3.12.59-60.45.1.s390x", "product_id": "kernel-syms-3.12.59-60.45.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-default-3.12.59-60.45.2.x86_64", "product_id": "kernel-default-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-default-devel-3.12.59-60.45.2.x86_64", "product_id": "kernel-default-devel-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-default-extra-3.12.59-60.45.2.x86_64", "product_id": "kernel-default-extra-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.59-60.45.1.x86_64", "product": { "name": "kernel-syms-3.12.59-60.45.1.x86_64", "product_id": "kernel-syms-3.12.59-60.45.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-xen-3.12.59-60.45.2.x86_64", "product_id": "kernel-xen-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-xen-devel-3.12.59-60.45.2.x86_64", "product_id": "kernel-xen-devel-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "product": { "name": "kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "product_id": "kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-ec2-3.12.59-60.45.2.x86_64", "product_id": "kernel-ec2-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-ec2-devel-3.12.59-60.45.2.x86_64", "product_id": "kernel-ec2-devel-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-ec2-extra-3.12.59-60.45.2.x86_64", "product_id": "kernel-ec2-extra-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.59-60.45.3.x86_64", "product": { "name": "kernel-obs-build-3.12.59-60.45.3.x86_64", "product_id": "kernel-obs-build-3.12.59-60.45.3.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-default-base-3.12.59-60.45.2.x86_64", "product_id": "kernel-default-base-3.12.59-60.45.2.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.59-60.45.2.x86_64", "product": { "name": "kernel-xen-base-3.12.59-60.45.2.x86_64", "product_id": "kernel-xen-base-3.12.59-60.45.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP1", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1", "product": { "name": "SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-devel-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-macros-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-source-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP1", "product_id": "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64" }, "product_reference": "kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-ec2-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-3.12.59-60.45.4.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.45.4.noarch" }, "product_reference": "kernel-docs-3.12.59-60.45.4.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.45.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.ppc64le" }, "product_reference": "kernel-obs-build-3.12.59-60.45.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.45.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.s390x" }, "product_reference": "kernel-obs-build-3.12.59-60.45.3.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-3.12.59-60.45.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP1", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.x86_64" }, "product_reference": "kernel-obs-build-3.12.59-60.45.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-man-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-devel-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-macros-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-source-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le" }, "product_reference": "kernel-syms-3.12.59-60.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.s390x as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.s390x" }, "product_reference": "kernel-syms-3.12.59-60.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP1", "product_id": "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-base-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.59-60.45.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x" }, "product_reference": "kernel-default-man-3.12.59-60.45.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-devel-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-macros-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.59-60.45.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.45.1.noarch" }, "product_reference": "kernel-source-3.12.59-60.45.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le" }, "product_reference": "kernel-syms-3.12.59-60.45.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.s390x" }, "product_reference": "kernel-syms-3.12.59-60.45.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.59-60.45.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64" }, "product_reference": "kernel-syms-3.12.59-60.45.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-base-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-xen-devel-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-3.12.59-60.45.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP1", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64" }, "product_reference": "kernel-default-extra-3.12.59-60.45.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP1" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Desktop 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Desktop 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-default-1-2.3.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_59-60_45-xen-1-2.3.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-man-3.12.59-60.45.2.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.59-60.45.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.59-60.45.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.59-60.45.2.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-docs-3.12.59-60.45.4.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP1:kernel-obs-build-3.12.59-60.45.3.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP1:kernel-default-extra-3.12.59-60.45.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-06-30T15:27:48Z", "details": "important" } ], "title": "CVE-2016-4997" } ] }
suse-su-2017:0333-1
Vulnerability from csaf_suse
Published
2017-01-30 16:03
Modified
2017-01-30 16:03
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.
This is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.
The following security bugs were fixed:
- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).
- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).
- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).
- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).
- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).
- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).
- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).
- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).
- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).
- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).
- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).
- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).
- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).
- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).
- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).
- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).
- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).
- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).
- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).
- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).
- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).
- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).
- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).
- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).
- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).
- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bnc#991608).
- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).
- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).
- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
The following non-security bugs were fixed:
- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).
- cdc-acm: added sanity checking for probe() (bsc#993891).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).
- kaweth: fix firmware download (bsc#993890).
- kaweth: fix oops upon failed memory allocation (bsc#993890).
- kvm: x86: SYSENTER emulation is broken (bsc#994618).
- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).
- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).
- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).
- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).
- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).
- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).
- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).
- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).
- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).
- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).
- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).
- powerpc: Add ability to build little endian kernels (bsc#967716).
- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).
- powerpc: Do not build assembly files with ABIv2 (bsc#967716).
- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).
- powerpc: dtc is required to build dtb files (bsc#967716).
- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).
- powerpc: Fix error when cross building TAGS & cscope (bsc#967716).
- powerpc: Make the vdso32 also build big-endian (bsc#967716).
- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).
- powerpc: Remove buggy 9-year-old test for binutils < 2.12.1 (bsc#967716).
- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).
- ppp: defer netns reference release for ppp channel (bsc#980371).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).
- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).
- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)
- Revert 's390/mm: fix asce_bits handling with dynamic pagetable levels' This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.
- rpm/config.sh: Set the release string to 0.7.<RELEASE> (bsc#997059)
- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)
- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).
- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).
- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).
- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: series.conf
- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).
- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.
- usb: fix typo in wMaxPacketSize validation (bsc#991665).
- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).
Patchnames
slessp2-kernel-12961
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThis is the last planned LTSS kernel update for the SUSE Linux Enterprise Server 11 SP2 LTSS.\n\nThe following security bugs were fixed:\n\n- CVE-2016-10088: The sg implementation in the Linux kernel did not properly restrict write operations in situations where the KERNEL_DS option is set, which allowed local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576 (bnc#1017710).\n- CVE-2004-0230: TCP, when using a large Window Size, made it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP (bnc#969340).\n- CVE-2016-8632: The tipc_msg_build function in net/tipc/msg.c in the Linux kernel did not validate the relationship between the minimum fragment length and the maximum packet size, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability (bnc#1008831).\n- CVE-2016-8399: An out of bounds read in the ping protocol handler could have lead to information disclosure (bsc#1014746).\n- CVE-2016-9793: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option (bnc#1013531).\n- CVE-2012-6704: The sock_setsockopt function in net/core/sock.c in the Linux kernel mishandled negative values of sk_sndbuf and sk_rcvbuf, which allowed local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option (bnc#1013542).\n- CVE-2016-9756: arch/x86/kvm/emulate.c in the Linux kernel did not properly initialize Code Segment (CS) in certain error cases, which allowed local users to obtain sensitive information from kernel stack memory via a crafted application (bnc#1013038).\n- CVE-2016-3841: The IPv6 stack in the Linux kernel mishandled options data, which allowed local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call (bnc#992566).\n- CVE-2016-9685: Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel allowed local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations (bnc#1012832).\n- CVE-2015-1350: The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecified removing extended privilege attributes, which allowed local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program (bnc#914939).\n- CVE-2015-8962: Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call (bnc#1010501).\n- CVE-2016-9555: The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel lacked chunk-length checking for the first chunk, which allowed remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data (bnc#1011685).\n- CVE-2016-7910: Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel allowed local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed (bnc#1010716).\n- CVE-2016-7911: Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call (bnc#1010711).\n- CVE-2015-8964: The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a tty data structure (bnc#1010507).\n- CVE-2016-7916: Race condition in the environ_read function in fs/proc/base.c in the Linux kernel allowed local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete (bnc#1010467).\n- CVE-2016-8646: The hash_accept function in crypto/algif_hash.c in the Linux kernel allowed local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data (bnc#1010150).\n- CVE-2016-8633: drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allowed remote attackers to execute arbitrary code via crafted fragmented packets (bnc#1008833).\n- CVE-2016-7042: The proc_keys_show function in security/keys/proc.c in the Linux kernel used an incorrect buffer size for certain timeout data, which allowed local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file (bnc#1004517).\n- CVE-2016-7097: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions (bnc#995968).\n- CVE-2017-5551: The filesystem implementation in the Linux kernel preserves the setgid bit during a setxattr call, which allowed local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. This CVE tracks the fix for the tmpfs filesystem. (bsc#1021258).\n- CVE-2015-8956: The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel allowed local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket (bnc#1003925).\n- CVE-2016-7117: Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel allowed remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing (bnc#1003077).\n- CVE-2016-0823: The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel allowed local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721 (bnc#994759).\n- CVE-2016-7425: The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel did not restrict a certain length field, which allowed local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code (bnc#999932).\n- CVE-2016-6828: The tcp_check_send_head function in include/net/tcp.h in the Linux kernel did not properly maintain certain SACK state after a failed data copy, which allowed local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option (bnc#994296).\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bnc#991608).\n- CVE-2016-4998: The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary (bsc#986365).\n- CVE-2015-7513: arch/x86/kvm/x86.c in the Linux kernel did not reset the PIT counter values during state restoration, which allowed guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions (bnc#960689).\n- CVE-2013-4312: The Linux kernel allowed local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c (bnc#839104).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relies on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n\n\nThe following non-security bugs were fixed:\n\n- arch/powerpc: Remove duplicate/redundant Altivec entries (bsc#967716).\n- cdc-acm: added sanity checking for probe() (bsc#993891).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- dasd: Fix unresumed device after suspend/resume (bnc#927287, LTC#123892).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- kabi, unix: properly account for FDs passed over unix sockets (bnc#839104).\n- kaweth: fix firmware download (bsc#993890).\n- kaweth: fix oops upon failed memory allocation (bsc#993890).\n- kvm: x86: SYSENTER emulation is broken (bsc#994618).\n- mm: thp: fix SMP race condition between THP page fault and MADV_DONTNEED (VM Functionality, bnc#986445).\n- mremap: enforce rmap src/dst vma ordering in case of vma_merge() succeeding in copy_vma() (VM Functionality, bsc#1008645).\n- nfs4: reset states to use open_stateid when returning delegation voluntarily (bsc#1007944).\n- nfs: Do not disconnect open-owner on NFS4ERR_BAD_SEQID (bsc#989261, bsc#1011482).\n- nfs: do not do blind d_drop() in nfs_prime_dcache() (bnc#908069 bnc#896484 bsc#963053).\n- nfs_prime_dcache needs fh to be set (bnc#908069 bnc#896484 bsc#963053).\n- nfs: Refresh open-owner id when server says SEQID is bad (bsc#989261).\n- nfsv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- nfsv4: fix broken patch relating to v4 read delegations (bsc#956514, bsc#989261, bsc#979595, bsc#1011482).\n- nfsv4: nfs4_proc_renew should be declared static (bnc#863873).\n- nfsv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- nfsv4: Recovery of recalled read delegations is broken (bsc#956514 bsc#1011482).\n- nfsv4: The NFSv4.0 client must send RENEW calls if it holds a delegation (bnc#863873).\n- powerpc: Add ability to build little endian kernels (bsc#967716).\n- powerpc: Avoid load of static chain register when calling nested functions through a pointer on 64bit (bsc#967716).\n- powerpc: Do not build assembly files with ABIv2 (bsc#967716).\n- powerpc: Do not use ELFv2 ABI to build the kernel (bsc#967716).\n- powerpc: dtc is required to build dtb files (bsc#967716).\n- powerpc: Fix 64 bit builds with binutils 2.24 (bsc#967716).\n- powerpc: Fix error when cross building TAGS \u0026 cscope (bsc#967716).\n- powerpc: Make the vdso32 also build big-endian (bsc#967716).\n- powerpc: Remove altivec fix for gcc versions before 4.0 (bsc#967716).\n- powerpc: Remove buggy 9-year-old test for binutils \u003c 2.12.1 (bsc#967716).\n- powerpc: Require gcc 4.0 on 64-bit (bsc#967716).\n- ppp: defer netns reference release for ppp channel (bsc#980371).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- qeth: Fix crash on initial MTU size change (bnc#835175, LTC#96809).\n- qeth: postpone freeing of qdio memory (bnc#874145, LTC#107873).\n- rpm/kernel-binary.spec.in: Export a make-stderr.log file (bsc#1012422)\n- Revert \u0027s390/mm: fix asce_bits handling with dynamic pagetable levels\u0027 This reverts commit 6e00b1d803fa2ab4b130e04b7fbcc99f0b5ecba8.\n- rpm/config.sh: Set the release string to 0.7.\u003cRELEASE\u003e (bsc#997059)\n- rpm/mkspec: Read a default release string from rpm/config.sh (bsc997059)\n- s390/dasd: fix failfast for disconnected devices (bnc#958000, LTC#135138).\n- s390/dasd: fix hanging device after clear subchannel (bnc#994436, LTC#144640).\n- s390/dasd: fix kernel panic when alias is set offline (bnc#940966, LTC#128595).\n- s390/dasd: fix list_del corruption after lcu changes (bnc#954984, LTC#133077).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456). Conflicts: \tseries.conf\n- s390/pageattr: do a single TLB flush for change_page_attr (bsc#1009443,LTC#148182).\n- Set CONFIG_DEBUG_INFO=y and CONFIG_DEBUG_INFO_REDUCED=n on all platforms The specfile adjusts the config if necessary, but a new version of run_oldconfig.sh requires the settings to be present in the repository.\n- usb: fix typo in wMaxPacketSize validation (bsc#991665).\n- usb: validate wMaxPacketValue entries in endpoint descriptors (bnc#991665).\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp2-kernel-12961", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_0333-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2017:0333-1", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170333-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2017:0333-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2017-January/002609.html" }, { "category": "self", "summary": "SUSE Bug 1003077", "url": "https://bugzilla.suse.com/1003077" }, { "category": "self", "summary": "SUSE Bug 1003925", "url": "https://bugzilla.suse.com/1003925" }, { "category": "self", "summary": "SUSE Bug 1004517", "url": "https://bugzilla.suse.com/1004517" }, { "category": "self", "summary": "SUSE Bug 1007944", "url": "https://bugzilla.suse.com/1007944" }, { "category": "self", "summary": "SUSE Bug 1008645", "url": "https://bugzilla.suse.com/1008645" }, { "category": "self", "summary": "SUSE Bug 1008831", "url": "https://bugzilla.suse.com/1008831" }, { "category": "self", "summary": "SUSE Bug 1008833", "url": "https://bugzilla.suse.com/1008833" }, { "category": "self", "summary": "SUSE Bug 1009443", "url": "https://bugzilla.suse.com/1009443" }, { "category": "self", "summary": "SUSE Bug 1010150", "url": "https://bugzilla.suse.com/1010150" }, { "category": "self", "summary": "SUSE Bug 1010467", "url": "https://bugzilla.suse.com/1010467" }, { "category": "self", "summary": "SUSE Bug 1010501", "url": "https://bugzilla.suse.com/1010501" }, { "category": "self", "summary": "SUSE Bug 1010507", "url": "https://bugzilla.suse.com/1010507" }, { "category": "self", "summary": "SUSE Bug 1010711", "url": "https://bugzilla.suse.com/1010711" }, { "category": "self", "summary": "SUSE Bug 1010716", "url": "https://bugzilla.suse.com/1010716" }, { "category": "self", "summary": "SUSE Bug 1011482", "url": "https://bugzilla.suse.com/1011482" }, { "category": "self", "summary": "SUSE Bug 1011685", "url": "https://bugzilla.suse.com/1011685" }, { "category": "self", "summary": "SUSE Bug 1012422", "url": "https://bugzilla.suse.com/1012422" }, { "category": "self", "summary": "SUSE Bug 1012832", "url": "https://bugzilla.suse.com/1012832" }, { "category": "self", "summary": "SUSE Bug 1013038", "url": "https://bugzilla.suse.com/1013038" }, { "category": "self", "summary": "SUSE Bug 1013531", "url": "https://bugzilla.suse.com/1013531" }, { "category": "self", "summary": "SUSE Bug 1013542", "url": "https://bugzilla.suse.com/1013542" }, { "category": "self", "summary": "SUSE Bug 1014746", "url": "https://bugzilla.suse.com/1014746" }, { "category": "self", "summary": "SUSE Bug 1017710", "url": "https://bugzilla.suse.com/1017710" }, { "category": "self", "summary": "SUSE Bug 1021258", "url": "https://bugzilla.suse.com/1021258" }, { "category": "self", "summary": "SUSE Bug 835175", "url": "https://bugzilla.suse.com/835175" }, { "category": "self", "summary": "SUSE Bug 839104", "url": "https://bugzilla.suse.com/839104" }, { "category": "self", "summary": "SUSE Bug 863873", "url": "https://bugzilla.suse.com/863873" }, { "category": "self", "summary": "SUSE Bug 874145", "url": "https://bugzilla.suse.com/874145" }, { "category": "self", "summary": "SUSE Bug 896484", "url": "https://bugzilla.suse.com/896484" }, { "category": "self", "summary": "SUSE Bug 908069", "url": "https://bugzilla.suse.com/908069" }, { "category": "self", "summary": "SUSE Bug 914939", "url": "https://bugzilla.suse.com/914939" }, { "category": "self", "summary": "SUSE Bug 922947", "url": "https://bugzilla.suse.com/922947" }, { "category": "self", "summary": "SUSE Bug 927287", "url": "https://bugzilla.suse.com/927287" }, { "category": "self", "summary": "SUSE Bug 940966", "url": "https://bugzilla.suse.com/940966" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 954984", "url": "https://bugzilla.suse.com/954984" }, { "category": "self", "summary": "SUSE Bug 956514", "url": "https://bugzilla.suse.com/956514" }, { "category": "self", "summary": "SUSE Bug 958000", "url": "https://bugzilla.suse.com/958000" }, { "category": "self", "summary": "SUSE Bug 960689", "url": "https://bugzilla.suse.com/960689" }, { "category": "self", "summary": "SUSE Bug 963053", "url": "https://bugzilla.suse.com/963053" }, { "category": "self", "summary": "SUSE Bug 967716", "url": "https://bugzilla.suse.com/967716" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 969340", "url": "https://bugzilla.suse.com/969340" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 980363", "url": "https://bugzilla.suse.com/980363" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986365", "url": "https://bugzilla.suse.com/986365" }, { "category": "self", "summary": "SUSE Bug 986445", "url": "https://bugzilla.suse.com/986445" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 989261", "url": "https://bugzilla.suse.com/989261" }, { "category": "self", "summary": "SUSE Bug 991608", "url": "https://bugzilla.suse.com/991608" }, { "category": "self", "summary": "SUSE Bug 991665", "url": "https://bugzilla.suse.com/991665" }, { "category": "self", "summary": "SUSE Bug 992566", "url": "https://bugzilla.suse.com/992566" }, { "category": "self", "summary": "SUSE Bug 993890", "url": "https://bugzilla.suse.com/993890" }, { "category": "self", "summary": "SUSE Bug 993891", "url": "https://bugzilla.suse.com/993891" }, { "category": "self", "summary": "SUSE Bug 994296", "url": "https://bugzilla.suse.com/994296" }, { "category": "self", "summary": "SUSE Bug 994436", "url": "https://bugzilla.suse.com/994436" }, { "category": "self", "summary": "SUSE Bug 994618", "url": "https://bugzilla.suse.com/994618" }, { "category": "self", "summary": "SUSE Bug 994759", "url": "https://bugzilla.suse.com/994759" }, { "category": "self", "summary": "SUSE Bug 995968", "url": "https://bugzilla.suse.com/995968" }, { "category": "self", "summary": "SUSE Bug 997059", "url": "https://bugzilla.suse.com/997059" }, { "category": "self", "summary": "SUSE Bug 999932", "url": "https://bugzilla.suse.com/999932" }, { "category": "self", "summary": "SUSE CVE CVE-2004-0230 page", "url": "https://www.suse.com/security/cve/CVE-2004-0230/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-6704 page", "url": "https://www.suse.com/security/cve/CVE-2012-6704/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-4312 page", "url": "https://www.suse.com/security/cve/CVE-2013-4312/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1350 page", "url": "https://www.suse.com/security/cve/CVE-2015-1350/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7513 page", "url": "https://www.suse.com/security/cve/CVE-2015-7513/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8956 page", "url": "https://www.suse.com/security/cve/CVE-2015-8956/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8962 page", "url": "https://www.suse.com/security/cve/CVE-2015-8962/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8964 page", "url": "https://www.suse.com/security/cve/CVE-2015-8964/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0823 page", "url": "https://www.suse.com/security/cve/CVE-2016-0823/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10088 page", "url": "https://www.suse.com/security/cve/CVE-2016-10088/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2189 page", "url": "https://www.suse.com/security/cve/CVE-2016-2189/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3841 page", "url": "https://www.suse.com/security/cve/CVE-2016-3841/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7097 page", "url": "https://www.suse.com/security/cve/CVE-2016-7097/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7117 page", "url": "https://www.suse.com/security/cve/CVE-2016-7117/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7910 page", "url": "https://www.suse.com/security/cve/CVE-2016-7910/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7911 page", "url": "https://www.suse.com/security/cve/CVE-2016-7911/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7916 page", "url": "https://www.suse.com/security/cve/CVE-2016-7916/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8399 page", "url": "https://www.suse.com/security/cve/CVE-2016-8399/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8632 page", "url": "https://www.suse.com/security/cve/CVE-2016-8632/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8633 page", "url": "https://www.suse.com/security/cve/CVE-2016-8633/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-8646 page", "url": "https://www.suse.com/security/cve/CVE-2016-8646/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9685 page", "url": "https://www.suse.com/security/cve/CVE-2016-9685/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9756 page", "url": "https://www.suse.com/security/cve/CVE-2016-9756/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9793 page", "url": "https://www.suse.com/security/cve/CVE-2016-9793/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5551 page", "url": "https://www.suse.com/security/cve/CVE-2017-5551/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2017-01-30T16:03:00Z", "generator": { "date": "2017-01-30T16:03:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2017:0333-1", "initial_release_date": "2017-01-30T16:03:00Z", "revision_history": [ { "date": "2017-01-30T16:03:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-pae-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-source-3.0.101-0.7.53.1.i586", "product_id": "kernel-source-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.i586", "product_id": "kernel-syms-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x", "product_id": "kernel-default-man-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-source-3.0.101-0.7.53.1.s390x", "product_id": "kernel-source-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x", "product_id": "kernel-syms-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-default-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-source-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-syms-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-base-3.0.101-0.7.53.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles_ltss:11:sp2" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-source-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.s390x as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.i586 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-0.7.53.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP2-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0230", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-0230" } ], "notes": [ { "category": "general", "text": "TCP, when using a large Window Size, makes it easier for remote attackers to guess sequence numbers and cause a denial of service (connection loss) to persistent TCP connections by repeatedly injecting a TCP RST packet, especially in protocols that use long-lived connections, such as BGP.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-0230", "url": "https://www.suse.com/security/cve/CVE-2004-0230" }, { "category": "external", "summary": "SUSE Bug 1184394 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1184394" }, { "category": "external", "summary": "SUSE Bug 1198501 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1198501" }, { "category": "external", "summary": "SUSE Bug 1206598 for CVE-2004-0230", "url": "https://bugzilla.suse.com/1206598" }, { "category": "external", "summary": "SUSE Bug 969340 for CVE-2004-0230", "url": "https://bugzilla.suse.com/969340" }, { "category": "external", "summary": "SUSE Bug 989152 for CVE-2004-0230", "url": "https://bugzilla.suse.com/989152" }, { "category": "external", "summary": "SUSE Bug 992991 for CVE-2004-0230", "url": "https://bugzilla.suse.com/992991" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.7, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2004-0230" }, { "cve": "CVE-2012-6704", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-6704" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUF or (2) SO_RCVBUF option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-6704", "url": "https://www.suse.com/security/cve/CVE-2012-6704" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2012-6704", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2012-6704" }, { "cve": "CVE-2013-4312", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-4312" } ], "notes": [ { "category": "general", "text": "The Linux kernel before 4.4.1 allows local users to bypass file-descriptor limits and cause a denial of service (memory consumption) by sending each descriptor over a UNIX socket before closing it, related to net/unix/af_unix.c and net/unix/garbage.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-4312", "url": "https://www.suse.com/security/cve/CVE-2013-4312" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2013-4312", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 839104 for CVE-2013-4312", "url": "https://bugzilla.suse.com/839104" }, { "category": "external", "summary": "SUSE Bug 922947 for CVE-2013-4312", "url": "https://bugzilla.suse.com/922947" }, { "category": "external", "summary": "SUSE Bug 968014 for CVE-2013-4312", "url": "https://bugzilla.suse.com/968014" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2013-4312" }, { "cve": "CVE-2015-1350", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1350" } ], "notes": [ { "category": "general", "text": "The VFS subsystem in the Linux kernel 3.x provides an incomplete set of requirements for setattr operations that underspecifies removing extended privilege attributes, which allows local users to cause a denial of service (capability stripping) via a failed invocation of a system call, as demonstrated by using chown to remove a capability from the ping or Wireshark dumpcap program.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1350", "url": "https://www.suse.com/security/cve/CVE-2015-1350" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-1350", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 914939 for CVE-2015-1350", "url": "https://bugzilla.suse.com/914939" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-1350" }, { "cve": "CVE-2015-7513", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7513" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7513", "url": "https://www.suse.com/security/cve/CVE-2015-7513" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7513", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 960689 for CVE-2015-7513", "url": "https://bugzilla.suse.com/960689" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2015-7513", "url": "https://bugzilla.suse.com/987709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7513" }, { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2015-8956", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8956" } ], "notes": [ { "category": "general", "text": "The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8956", "url": "https://www.suse.com/security/cve/CVE-2015-8956" }, { "category": "external", "summary": "SUSE Bug 1003925 for CVE-2015-8956", "url": "https://bugzilla.suse.com/1003925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8956" }, { "cve": "CVE-2015-8962", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8962" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8962", "url": "https://www.suse.com/security/cve/CVE-2015-8962" }, { "category": "external", "summary": "SUSE Bug 1010501 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1010501" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8962", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2015-8962" }, { "cve": "CVE-2015-8964", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8964" } ], "notes": [ { "category": "general", "text": "The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8964", "url": "https://www.suse.com/security/cve/CVE-2015-8964" }, { "category": "external", "summary": "SUSE Bug 1010507 for CVE-2015-8964", "url": "https://bugzilla.suse.com/1010507" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2015-8964" }, { "cve": "CVE-2016-0823", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0823" } ], "notes": [ { "category": "general", "text": "The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0823", "url": "https://www.suse.com/security/cve/CVE-2016-0823" }, { "category": "external", "summary": "SUSE Bug 987709 for CVE-2016-0823", "url": "https://bugzilla.suse.com/987709" }, { "category": "external", "summary": "SUSE Bug 994759 for CVE-2016-0823", "url": "https://bugzilla.suse.com/994759" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-0823" }, { "cve": "CVE-2016-10088", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10088" } ], "notes": [ { "category": "general", "text": "The sg implementation in the Linux kernel through 4.9 does not properly restrict write operations in situations where the KERNEL_DS option is set, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device, related to block/bsg.c and drivers/scsi/sg.c. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9576.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10088", "url": "https://www.suse.com/security/cve/CVE-2016-10088" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-10088", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-10088" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-2189", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2189" } ], "notes": [ { "category": "general", "text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-4565. Reason: This candidate is a reservation duplicate of CVE-2016-4565. Notes: All CVE users should reference CVE-2016-4565 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2189", "url": "https://www.suse.com/security/cve/CVE-2016-2189" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-2189", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-2189", "url": "https://bugzilla.suse.com/980363" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-2189" }, { "cve": "CVE-2016-3841", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3841" } ], "notes": [ { "category": "general", "text": "The IPv6 stack in the Linux kernel before 4.3.3 mishandles options data, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3841", "url": "https://www.suse.com/security/cve/CVE-2016-3841" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3841", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 992566 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992566" }, { "category": "external", "summary": "SUSE Bug 992569 for CVE-2016-3841", "url": "https://bugzilla.suse.com/992569" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-3841" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7097", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7097" } ], "notes": [ { "category": "general", "text": "The filesystem implementation in the Linux kernel through 4.8.2 preserves the setgid bit during a setxattr call, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7097", "url": "https://www.suse.com/security/cve/CVE-2016-7097" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-7097", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-7097", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2016-7097", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7097" }, { "cve": "CVE-2016-7117", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7117" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7117", "url": "https://www.suse.com/security/cve/CVE-2016-7117" }, { "category": "external", "summary": "SUSE Bug 1003077 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003077" }, { "category": "external", "summary": "SUSE Bug 1003253 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1003253" }, { "category": "external", "summary": "SUSE Bug 1057478 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1057478" }, { "category": "external", "summary": "SUSE Bug 1071943 for CVE-2016-7117", "url": "https://bugzilla.suse.com/1071943" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7117" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7910", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7910" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7910", "url": "https://www.suse.com/security/cve/CVE-2016-7910" }, { "category": "external", "summary": "SUSE Bug 1010716 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1010716" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 1196722 for CVE-2016-7910", "url": "https://bugzilla.suse.com/1196722" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-7910" }, { "cve": "CVE-2016-7911", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7911" } ], "notes": [ { "category": "general", "text": "Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7911", "url": "https://www.suse.com/security/cve/CVE-2016-7911" }, { "category": "external", "summary": "SUSE Bug 1010711 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010711" }, { "category": "external", "summary": "SUSE Bug 1010713 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1010713" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7911", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7911" }, { "cve": "CVE-2016-7916", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7916" } ], "notes": [ { "category": "general", "text": "Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7916", "url": "https://www.suse.com/security/cve/CVE-2016-7916" }, { "category": "external", "summary": "SUSE Bug 1010467 for CVE-2016-7916", "url": "https://bugzilla.suse.com/1010467" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-7916" }, { "cve": "CVE-2016-8399", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8399" } ], "notes": [ { "category": "general", "text": "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8399", "url": "https://www.suse.com/security/cve/CVE-2016-8399" }, { "category": "external", "summary": "SUSE Bug 1014746 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1014746" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8399", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8399" }, { "cve": "CVE-2016-8632", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8632" } ], "notes": [ { "category": "general", "text": "The tipc_msg_build function in net/tipc/msg.c in the Linux kernel through 4.8.11 does not validate the relationship between the minimum fragment length and the maximum packet size, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) by leveraging the CAP_NET_ADMIN capability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8632", "url": "https://www.suse.com/security/cve/CVE-2016-8632" }, { "category": "external", "summary": "SUSE Bug 1008831 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1008831" }, { "category": "external", "summary": "SUSE Bug 1012852 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1012852" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-8632", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8632" }, { "cve": "CVE-2016-8633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8633" } ], "notes": [ { "category": "general", "text": "drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8633", "url": "https://www.suse.com/security/cve/CVE-2016-8633" }, { "category": "external", "summary": "SUSE Bug 1008833 for CVE-2016-8633", "url": "https://bugzilla.suse.com/1008833" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8633" }, { "cve": "CVE-2016-8646", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-8646" } ], "notes": [ { "category": "general", "text": "The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-8646", "url": "https://www.suse.com/security/cve/CVE-2016-8646" }, { "category": "external", "summary": "SUSE Bug 1010150 for CVE-2016-8646", "url": "https://bugzilla.suse.com/1010150" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-8646" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9685", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9685" } ], "notes": [ { "category": "general", "text": "Multiple memory leaks in error paths in fs/xfs/xfs_attr_list.c in the Linux kernel before 4.5.1 allow local users to cause a denial of service (memory consumption) via crafted XFS filesystem operations.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9685", "url": "https://www.suse.com/security/cve/CVE-2016-9685" }, { "category": "external", "summary": "SUSE Bug 1012832 for CVE-2016-9685", "url": "https://bugzilla.suse.com/1012832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "low" } ], "title": "CVE-2016-9685" }, { "cve": "CVE-2016-9756", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9756" } ], "notes": [ { "category": "general", "text": "arch/x86/kvm/emulate.c in the Linux kernel before 4.8.12 does not properly initialize Code Segment (CS) in certain error cases, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9756", "url": "https://www.suse.com/security/cve/CVE-2016-9756" }, { "category": "external", "summary": "SUSE Bug 1013038 for CVE-2016-9756", "url": "https://bugzilla.suse.com/1013038" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9756" }, { "cve": "CVE-2016-9793", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9793" } ], "notes": [ { "category": "general", "text": "The sock_setsockopt function in net/core/sock.c in the Linux kernel before 4.8.14 mishandles negative values of sk_sndbuf and sk_rcvbuf, which allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability for a crafted setsockopt system call with the (1) SO_SNDBUFFORCE or (2) SO_RCVBUFFORCE option.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9793", "url": "https://www.suse.com/security/cve/CVE-2016-9793" }, { "category": "external", "summary": "SUSE Bug 1013531 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013531" }, { "category": "external", "summary": "SUSE Bug 1013542 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1013542" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9793", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2016-9793" }, { "cve": "CVE-2017-5551", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5551" } ], "notes": [ { "category": "general", "text": "The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5551", "url": "https://www.suse.com/security/cve/CVE-2017-5551" }, { "category": "external", "summary": "SUSE Bug 1021258 for CVE-2017-5551", "url": "https://bugzilla.suse.com/1021258" }, { "category": "external", "summary": "SUSE Bug 995968 for CVE-2017-5551", "url": "https://bugzilla.suse.com/995968" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-default-man-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-ec2-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-pae-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-source-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-syms-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.s390x", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-trace-devel-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-base-3.0.101-0.7.53.1.x86_64", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.i586", "SUSE Linux Enterprise Server 11 SP2-LTSS:kernel-xen-devel-3.0.101-0.7.53.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2017-01-30T16:03:00Z", "details": "moderate" } ], "title": "CVE-2017-5551" } ] }
suse-su-2016:1985-1
Vulnerability from csaf_suse
Published
2016-08-08 14:55
Modified
2016-08-08 14:55
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).
- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).
- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).
- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).
- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).
- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).
- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).
- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).
- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).
- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).
- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).
- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).
- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).
- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).
- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).
- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).
- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).
- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).
- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).
The following non-security bugs were fixed:
- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).
- ALSA: oxygen: add Xonar DGX support (bsc#982691).
- Assign correct ->can_queue value in hv_storvsc (bnc#969391)
- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).
- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)
- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).
- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).
- NFS: Do not attempt to decode missing directory entries (bsc#980931).
- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).
- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).
- NFS: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).
- NFS: reduce access cache shrinker locking (bnc#866130).
- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).
- NFSv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).
- NVMe: Unify controller probe and resume (bsc#979347).
- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).
- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).
- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).
- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).
- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).
- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).
- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).
- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).
- SCSI: Increase REPORT_LUNS timeout (bsc#971989).
- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.
- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).
- bridge: superfluous skb->nfct check in br_nf_dev_queue_xmit (bsc#982544).
- cgroups: do not attach task to subsystem if migration failed (bnc#979274).
- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).
- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).
- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).
- enic: set netdev->vlan_features (bsc#966245).
- fcoe: fix reset of fip selection time (bsc#974787).
- hid-elo: kill not flush the work (bnc#982532).
- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).
- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).
- ipv4: fix ineffective source address selection (bsc#980788).
- ipvs: count pre-established TCP states as active (bsc#970114).
- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).
- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).
- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).
- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).
- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).
- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).
- mm: Fix DIF failures on ext3 filesystems (bsc#971030).
- net/qlge: Avoids recursive EEH error (bsc#954847).
- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).
- netfilter: bridge: do not leak skb in error paths (bsc#982544).
- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).
- nvme: fix max_segments integer truncation (bsc#676471).
- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).
- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).
- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).
- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).
- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.
- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).
- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).
- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).
- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).
- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).
- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).
- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).
- s390/pci_dma: fix DMA table corruption with > 4 TB main memory (bnc#968500, LTC#139401).
- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).
- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).
- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).
- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).
- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).
- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).
- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).
- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).
- veth: do not modify ip_summed (bsc#969149).
- vgaarb: Add more context to error messages (bsc#976868).
- virtio_scsi: Implement eh_timed_out callback (bsc#936530).
- x86, kvm: fix kvm's usage of kernel_fpu_begin/end() (bsc#961518).
- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).
- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).
Patchnames
slertesp4-linux-kernel-12681
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 11 SP4 RT kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bnc#986572).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bnc#986362).\n- CVE-2016-4470: The key_reject_and_link function in security/keys/key.c in the Linux kernel did not ensure that a certain data structure is initialized, which allowed local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command (bnc#984755).\n- CVE-2016-5244: The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel did not initialize a certain structure member, which allowed remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message (bnc#983213).\n- CVE-2016-1583: The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel allowed local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling (bnc#983143).\n- CVE-2016-4913: The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel mishandled NM (aka alternate name) entries containing \\0 characters, which allowed local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem (bnc#980725).\n- CVE-2016-4580: The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel did not properly initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request (bnc#981267).\n- CVE-2016-4805: Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel allowed local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions (bnc#980371).\n- CVE-2016-0758: Integer overflow in lib/asn1_decoder.c in the Linux kernel allowed local users to gain privileges via crafted ASN.1 data (bnc#979867).\n- CVE-2015-7833: The usbvision driver in the Linux kernel allowed physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor (bnc#950998).\n- CVE-2016-3707: The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, allowed remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file (bnc#980246).\n- CVE-2016-2187: The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor (bnc#971944).\n- CVE-2016-4482: The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call (bnc#978401).\n- CVE-2016-2053: The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel allowed attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c (bnc#963762).\n- CVE-2016-4565: The InfiniBand (aka IB) stack in the Linux kernel incorrectly relied on the write system call, which allowed local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface (bnc#979548).\n- CVE-2016-4485: The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel did not initialize a certain data structure, which allowed attackers to obtain sensitive information from kernel stack memory by reading a message (bnc#978821).\n- CVE-2016-4578: sound/core/timer.c in the Linux kernel did not initialize certain r1 data structures, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions (bnc#979879).\n- CVE-2016-4569: The snd_timer_user_params function in sound/core/timer.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface (bnc#979213).\n- CVE-2016-4486: The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel did not initialize a certain data structure, which allowed local users to obtain sensitive information from kernel stack memory by reading a Netlink message (bnc#978822).\n- CVE-2016-3134: The netfilter subsystem in the Linux kernel did not validate certain offset fields, which allowed local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call (bnc#971126).\n\nThe following non-security bugs were fixed:\n- ALSA: hrtimer: Handle start/stop more properly (bsc#973378).\n- ALSA: oxygen: add Xonar DGX support (bsc#982691).\n- Assign correct -\u003ecan_queue value in hv_storvsc (bnc#969391)\n- Delete patches.drivers/nvme-0165-Split-header-file-into-user-visible-and-kernel-.patch. SLE11-SP4 does not have uapi headers so move everything back to the original header (bnc#981231)\n- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets (bsc#976739).\n- Fix cifs_uniqueid_to_ino_t() function for s390x (bsc#944309)\n- KVM: x86: fix maintenance of guest/host xcr0 state (bsc#961518).\n- MM: increase safety margin provided by PF_LESS_THROTTLE (bsc#956491).\n- NFS: Do not attempt to decode missing directory entries (bsc#980931).\n- NFS: avoid deadlocks with loop-back mounted NFS filesystems (bsc#956491).\n- NFS: avoid waiting at all in nfs_release_page when congested (bsc#956491).\n- NFS: fix memory corruption rooted in get_ih_name pointer math (bsc#984107).\n- NFS: reduce access cache shrinker locking (bnc#866130).\n- NFSv4: Ensure that we do not drop a state owner more than once (bsc#979595).\n- NFSv4: OPEN must handle the NFS4ERR_IO return code correctly (bsc#979595).\n- NVMe: Unify controller probe and resume (bsc#979347).\n- RDMA/cxgb4: Configure 0B MRs to match HW implementation (bsc#909589).\n- RDMA/cxgb4: Do not hang threads forever waiting on WR replies (bsc#909589).\n- RDMA/cxgb4: Fix locking issue in process_mpa_request (bsc#909589).\n- RDMA/cxgb4: Handle NET_XMIT return codes (bsc#909589).\n- RDMA/cxgb4: Increase epd buff size for debug interface (bsc#909589).\n- RDMA/cxgb4: Limit MRs to less than 8GB for T4/T5 devices (bsc#909589).\n- RDMA/cxgb4: Serialize CQ event upcalls with CQ destruction (bsc#909589).\n- RDMA/cxgb4: Wake up waiters after flushing the qp (bsc#909589).\n- SCSI: Increase REPORT_LUNS timeout (bsc#971989).\n- Update patches.drivers/nvme-0265-fix-max_segments-integer-truncation.patch (bsc#979419). Fix reference.\n- Update patches.fixes/bnx2x-Alloc-4k-fragment-for-each-rx-ring-buffer-elem.patch (bsc#953369 bsc#975358).\n- bridge: superfluous skb-\u003enfct check in br_nf_dev_queue_xmit (bsc#982544).\n- cgroups: do not attach task to subsystem if migration failed (bnc#979274).\n- cgroups: more safe tasklist locking in cgroup_attach_proc (bnc#979274).\n- cpuset: Fix potential deadlock w/ set_mems_allowed (bsc#960857, bsc#974646).\n- dasd: fix hanging system after LCU changes (bnc#968500, LTC#136671).\n- enic: set netdev-\u003evlan_features (bsc#966245).\n- fcoe: fix reset of fip selection time (bsc#974787).\n- hid-elo: kill not flush the work (bnc#982532).\n- ipc,sem: fix use after free on IPC_RMID after a task using same semaphore set exits (bsc#967914).\n- ipv4/fib: do not warn when primary address is missing if in_dev is dead (bsc#971360).\n- ipv4: fix ineffective source address selection (bsc#980788).\n- ipvs: count pre-established TCP states as active (bsc#970114).\n- iucv: call skb_linearize() when needed (bnc#979915, LTC#141240).\n- kabi: prevent spurious modversion changes after bsc#982544 fix (bsc#982544).\n- mm/hugetlb.c: correct missing private flag clearing (VM Functionality, bnc#971446).\n- mm/hugetlb: fix backport of upstream commit 07443a85ad (VM Functionality, bnc#971446).\n- mm/swap.c: flush lru pvecs on compound page arrival (bnc#983721).\n- mm/vmscan.c: avoid throttling reclaim for loop-back nfsd threads (bsc#956491).\n- mm: Fix DIF failures on ext3 filesystems (bsc#971030).\n- net/qlge: Avoids recursive EEH error (bsc#954847).\n- netfilter: bridge: Use __in6_dev_get rather than in6_dev_get in br_validate_ipv6 (bsc#982544).\n- netfilter: bridge: do not leak skb in error paths (bsc#982544).\n- netfilter: bridge: forward IPv6 fragmented packets (bsc#982544).\n- nvme: fix max_segments integer truncation (bsc#676471).\n- ocfs2: do not set fs read-only if rec[0] is empty while committing truncate (bnc#971947).\n- ocfs2: extend enough credits for freeing one truncate record while replaying truncate records (bnc#971947).\n- ocfs2: extend transaction for ocfs2_remove_rightmost_path() and ocfs2_update_edge_lengths() before to avoid inconsistency between inode and et (bnc#971947).\n- qeth: delete napi struct when removing a qeth device (bnc#979915, LTC#143590).\n- rpm/modprobe-xen.conf: Revert comment change to allow parallel install (bsc#957986). This reverts commit 855c7ce885fd412ce2a25ccc12a46e565c83f235.\n- s390/dasd: prevent incorrect length error under z/VM after PAV changes (bnc#968500, LTC#136670).\n- s390/mm: fix asce_bits handling with dynamic pagetable levels (bnc#979915, LTC#141456).\n- s390/pci: add extra padding to function measurement block (bnc#968500, LTC#139445).\n- s390/pci: enforce fmb page boundary rule (bnc#968500, LTC#139445).\n- s390/pci: extract software counters from fmb (bnc#968500, LTC#139445).\n- s390/pci: fix use after free in dma_init (bnc#979915, LTC#141626).\n- s390/pci: remove pdev pointer from arch data (bnc#968500, LTC#139444).\n- s390/pci_dma: fix DMA table corruption with \u003e 4 TB main memory (bnc#968500, LTC#139401).\n- s390/pci_dma: handle dma table failures (bnc#968500, LTC#139442).\n- s390/pci_dma: improve debugging of errors during dma map (bnc#968500, LTC#139442).\n- s390/pci_dma: unify label of invalid translation table entries (bnc#968500, LTC#139442).\n- s390/spinlock: avoid yield to non existent cpu (bnc#968500, LTC#141106).\n- s390: fix test_fp_ctl inline assembly contraints (bnc#979915, LTC#143138).\n- sched/cputime: Fix clock_nanosleep()/clock_gettime() inconsistency (bnc#988498).\n- sched/cputime: Fix cpu_timer_sample_group() double accounting (bnc#988498).\n- sched: Provide update_curr callbacks for stop/idle scheduling classes (bnc#988498).\n- veth: do not modify ip_summed (bsc#969149).\n- vgaarb: Add more context to error messages (bsc#976868).\n- virtio_scsi: Implement eh_timed_out callback (bsc#936530).\n- x86, kvm: fix kvm\u0027s usage of kernel_fpu_begin/end() (bsc#961518).\n- x86, kvm: use kernel_fpu_begin/end() in kvm_load/put_guest_fpu() (bsc#961518).\n- x86/mm/pat, /dev/mem: Remove superfluous error message (bsc#974620).\n", "title": "Description of the patch" }, { "category": "details", "text": "slertesp4-linux-kernel-12681", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_1985-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:1985-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20161985-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:1985-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002180.html" }, { "category": "self", "summary": "SUSE Bug 676471", "url": "https://bugzilla.suse.com/676471" }, { "category": "self", "summary": "SUSE Bug 866130", "url": "https://bugzilla.suse.com/866130" }, { "category": "self", "summary": "SUSE Bug 909589", "url": "https://bugzilla.suse.com/909589" }, { "category": "self", "summary": "SUSE Bug 936530", "url": "https://bugzilla.suse.com/936530" }, { "category": "self", "summary": "SUSE Bug 944309", "url": "https://bugzilla.suse.com/944309" }, { "category": "self", "summary": "SUSE Bug 950998", "url": "https://bugzilla.suse.com/950998" }, { "category": "self", "summary": "SUSE Bug 953369", "url": "https://bugzilla.suse.com/953369" }, { "category": "self", "summary": "SUSE Bug 954847", "url": "https://bugzilla.suse.com/954847" }, { "category": "self", "summary": "SUSE Bug 956491", "url": "https://bugzilla.suse.com/956491" }, { "category": "self", "summary": "SUSE Bug 957986", "url": "https://bugzilla.suse.com/957986" }, { "category": "self", "summary": "SUSE Bug 960857", "url": "https://bugzilla.suse.com/960857" }, { "category": "self", "summary": "SUSE Bug 961518", "url": "https://bugzilla.suse.com/961518" }, { "category": "self", "summary": "SUSE Bug 963762", "url": "https://bugzilla.suse.com/963762" }, { "category": "self", "summary": "SUSE Bug 966245", "url": "https://bugzilla.suse.com/966245" }, { "category": "self", "summary": "SUSE Bug 967914", "url": "https://bugzilla.suse.com/967914" }, { "category": "self", "summary": "SUSE Bug 968500", "url": "https://bugzilla.suse.com/968500" }, { "category": "self", "summary": "SUSE Bug 969149", "url": "https://bugzilla.suse.com/969149" }, { "category": "self", "summary": "SUSE Bug 969391", "url": "https://bugzilla.suse.com/969391" }, { "category": "self", "summary": "SUSE Bug 970114", "url": "https://bugzilla.suse.com/970114" }, { "category": "self", "summary": "SUSE Bug 971030", "url": "https://bugzilla.suse.com/971030" }, { "category": "self", "summary": "SUSE Bug 971126", "url": "https://bugzilla.suse.com/971126" }, { "category": "self", "summary": "SUSE Bug 971360", "url": "https://bugzilla.suse.com/971360" }, { "category": "self", "summary": "SUSE Bug 971446", "url": "https://bugzilla.suse.com/971446" }, { "category": "self", "summary": "SUSE Bug 971944", "url": "https://bugzilla.suse.com/971944" }, { "category": "self", "summary": "SUSE Bug 971947", "url": "https://bugzilla.suse.com/971947" }, { "category": "self", "summary": "SUSE Bug 971989", "url": "https://bugzilla.suse.com/971989" }, { "category": "self", "summary": "SUSE Bug 973378", "url": "https://bugzilla.suse.com/973378" }, { "category": "self", "summary": "SUSE Bug 974620", "url": "https://bugzilla.suse.com/974620" }, { "category": "self", "summary": "SUSE Bug 974646", "url": "https://bugzilla.suse.com/974646" }, { "category": "self", "summary": "SUSE Bug 974787", "url": "https://bugzilla.suse.com/974787" }, { "category": "self", "summary": "SUSE Bug 975358", "url": "https://bugzilla.suse.com/975358" }, { "category": "self", "summary": "SUSE Bug 976739", "url": "https://bugzilla.suse.com/976739" }, { "category": "self", "summary": "SUSE Bug 976868", "url": "https://bugzilla.suse.com/976868" }, { "category": "self", "summary": "SUSE Bug 978401", "url": "https://bugzilla.suse.com/978401" }, { "category": "self", "summary": "SUSE Bug 978821", "url": "https://bugzilla.suse.com/978821" }, { "category": "self", "summary": "SUSE Bug 978822", "url": "https://bugzilla.suse.com/978822" }, { "category": "self", "summary": "SUSE Bug 979213", "url": "https://bugzilla.suse.com/979213" }, { "category": "self", "summary": "SUSE Bug 979274", "url": "https://bugzilla.suse.com/979274" }, { "category": "self", "summary": "SUSE Bug 979347", "url": "https://bugzilla.suse.com/979347" }, { "category": "self", "summary": "SUSE Bug 979419", "url": "https://bugzilla.suse.com/979419" }, { "category": "self", "summary": "SUSE Bug 979548", "url": "https://bugzilla.suse.com/979548" }, { "category": "self", "summary": "SUSE Bug 979595", "url": "https://bugzilla.suse.com/979595" }, { "category": "self", "summary": "SUSE Bug 979867", "url": "https://bugzilla.suse.com/979867" }, { "category": "self", "summary": "SUSE Bug 979879", "url": "https://bugzilla.suse.com/979879" }, { "category": "self", "summary": "SUSE Bug 979915", "url": "https://bugzilla.suse.com/979915" }, { "category": "self", "summary": "SUSE Bug 980246", "url": "https://bugzilla.suse.com/980246" }, { "category": "self", "summary": "SUSE Bug 980371", "url": "https://bugzilla.suse.com/980371" }, { "category": "self", "summary": "SUSE Bug 980725", "url": "https://bugzilla.suse.com/980725" }, { "category": "self", "summary": "SUSE Bug 980788", "url": "https://bugzilla.suse.com/980788" }, { "category": "self", "summary": "SUSE Bug 980931", "url": "https://bugzilla.suse.com/980931" }, { "category": "self", "summary": "SUSE Bug 981231", "url": "https://bugzilla.suse.com/981231" }, { "category": "self", "summary": "SUSE Bug 981267", "url": "https://bugzilla.suse.com/981267" }, { "category": "self", "summary": "SUSE Bug 982532", "url": "https://bugzilla.suse.com/982532" }, { "category": "self", "summary": "SUSE Bug 982544", "url": "https://bugzilla.suse.com/982544" }, { "category": "self", "summary": "SUSE Bug 982691", "url": "https://bugzilla.suse.com/982691" }, { "category": "self", "summary": "SUSE Bug 983143", "url": "https://bugzilla.suse.com/983143" }, { "category": "self", "summary": "SUSE Bug 983213", "url": "https://bugzilla.suse.com/983213" }, { "category": "self", "summary": "SUSE Bug 983721", "url": "https://bugzilla.suse.com/983721" }, { "category": "self", "summary": "SUSE Bug 984107", "url": "https://bugzilla.suse.com/984107" }, { "category": "self", "summary": "SUSE Bug 984755", "url": "https://bugzilla.suse.com/984755" }, { "category": "self", "summary": "SUSE Bug 986362", "url": "https://bugzilla.suse.com/986362" }, { "category": "self", "summary": "SUSE Bug 986572", "url": "https://bugzilla.suse.com/986572" }, { "category": "self", "summary": "SUSE Bug 988498", "url": "https://bugzilla.suse.com/988498" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7833 page", "url": "https://www.suse.com/security/cve/CVE-2015-7833/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0758 page", "url": "https://www.suse.com/security/cve/CVE-2016-0758/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2053 page", "url": "https://www.suse.com/security/cve/CVE-2016-2053/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2187 page", "url": "https://www.suse.com/security/cve/CVE-2016-2187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3707 page", "url": "https://www.suse.com/security/cve/CVE-2016-3707/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4482 page", "url": "https://www.suse.com/security/cve/CVE-2016-4482/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4565 page", "url": "https://www.suse.com/security/cve/CVE-2016-4565/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4580 page", "url": "https://www.suse.com/security/cve/CVE-2016-4580/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4805 page", "url": "https://www.suse.com/security/cve/CVE-2016-4805/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4913 page", "url": "https://www.suse.com/security/cve/CVE-2016-4913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2016-08-08T14:55:45Z", "generator": { "date": "2016-08-08T14:55:45Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:1985-1", "initial_release_date": "2016-08-08T14:55:45Z", "revision_history": [ { "date": "2016-08-08T14:55:45Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-base-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-source-rt-3.0.101.rt130-57.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "product": { "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "product_id": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 11 SP4", "product": { "name": "SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4", "product_identification_helper": { "cpe": "cpe:/a:suse:suse-linux-enterprise-rt:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-base-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-source-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64 as component of SUSE Linux Enterprise Real Time 11 SP4", "product_id": "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" }, "product_reference": "kernel-syms-rt-3.0.101.rt130-57.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 11 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7833", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7833" } ], "notes": [ { "category": "general", "text": "The usbvision driver in the Linux kernel package 3.10.0-123.20.1.el7 through 3.10.0-229.14.1.el7 in Red Hat Enterprise Linux (RHEL) 7.1 allows physically proximate attackers to cause a denial of service (panic) via a nonzero bInterfaceNumber value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7833", "url": "https://www.suse.com/security/cve/CVE-2015-7833" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7833", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 950998 for CVE-2015-7833", "url": "https://bugzilla.suse.com/950998" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2015-7833" }, { "cve": "CVE-2016-0758", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0758" } ], "notes": [ { "category": "general", "text": "Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0758", "url": "https://www.suse.com/security/cve/CVE-2016-0758" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1072204 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1072204" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-0758", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 979867 for CVE-2016-0758", "url": "https://bugzilla.suse.com/979867" }, { "category": "external", "summary": "SUSE Bug 980856 for CVE-2016-0758", "url": "https://bugzilla.suse.com/980856" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-0758" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2053", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2053" } ], "notes": [ { "category": "general", "text": "The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2053", "url": "https://www.suse.com/security/cve/CVE-2016-2053" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2053", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 963762 for CVE-2016-2053", "url": "https://bugzilla.suse.com/963762" }, { "category": "external", "summary": "SUSE Bug 979074 for CVE-2016-2053", "url": "https://bugzilla.suse.com/979074" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-2053" }, { "cve": "CVE-2016-2187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2187" } ], "notes": [ { "category": "general", "text": "The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2187", "url": "https://www.suse.com/security/cve/CVE-2016-2187" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2187", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971919 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971919" }, { "category": "external", "summary": "SUSE Bug 971944 for CVE-2016-2187", "url": "https://bugzilla.suse.com/971944" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-2187" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3707", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3707" } ], "notes": [ { "category": "general", "text": "The icmp_check_sysrq function in net/ipv4/icmp.c in the kernel.org projects/rt patches for the Linux kernel, as used in the kernel-rt package before 3.10.0-327.22.1 in Red Hat Enterprise Linux for Real Time 7 and other products, allows remote attackers to execute SysRq commands via crafted ICMP Echo Request packets, as demonstrated by a brute-force attack to discover a cookie, or an attack that occurs after reading the local icmp_echo_sysrq file.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3707", "url": "https://www.suse.com/security/cve/CVE-2016-3707" }, { "category": "external", "summary": "SUSE Bug 980246 for CVE-2016-3707", "url": "https://bugzilla.suse.com/980246" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-3707" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4482", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4482" } ], "notes": [ { "category": "general", "text": "The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4482", "url": "https://www.suse.com/security/cve/CVE-2016-4482" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4482", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978401 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978401" }, { "category": "external", "summary": "SUSE Bug 978445 for CVE-2016-4482", "url": "https://bugzilla.suse.com/978445" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4482" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4565", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4565" } ], "notes": [ { "category": "general", "text": "The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4565", "url": "https://www.suse.com/security/cve/CVE-2016-4565" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4565", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979548 for CVE-2016-4565", "url": "https://bugzilla.suse.com/979548" }, { "category": "external", "summary": "SUSE Bug 980363 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980363" }, { "category": "external", "summary": "SUSE Bug 980883 for CVE-2016-4565", "url": "https://bugzilla.suse.com/980883" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4565" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4580", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4580" } ], "notes": [ { "category": "general", "text": "The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4580", "url": "https://www.suse.com/security/cve/CVE-2016-4580" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4580", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 981267 for CVE-2016-4580", "url": "https://bugzilla.suse.com/981267" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4580", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4580" }, { "cve": "CVE-2016-4805", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4805" } ], "notes": [ { "category": "general", "text": "Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4805", "url": "https://www.suse.com/security/cve/CVE-2016-4805" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4805", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 980371 for CVE-2016-4805", "url": "https://bugzilla.suse.com/980371" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "low" } ], "title": "CVE-2016-4805" }, { "cve": "CVE-2016-4913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4913" } ], "notes": [ { "category": "general", "text": "The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \\0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4913", "url": "https://www.suse.com/security/cve/CVE-2016-4913" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-4913", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-4913", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 980725 for CVE-2016-4913", "url": "https://bugzilla.suse.com/980725" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4913", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-4913" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-base-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-rt_trace-devel-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-source-rt-3.0.101.rt130-57.1.x86_64", "SUSE Linux Enterprise Real Time 11 SP4:kernel-syms-rt-3.0.101.rt130-57.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-08T14:55:45Z", "details": "moderate" } ], "title": "CVE-2016-5829" } ] }
suse-su-2016:2180-1
Vulnerability from csaf_suse
Published
2016-08-29 09:25
Modified
2016-08-29 09:25
Summary
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 4 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.57-60_35 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1285
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.57-60_35 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1285", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2180-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2180-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162180-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2180-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002236.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 4 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:25:55Z", "generator": { "date": "2016-08-29T09:25:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2180-1", "initial_release_date": "2016-08-29T09:25:55Z", "revision_history": [ { "date": "2016-08-29T09:25:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64", "product_id": "kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:55Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:55Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-default-3-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_57-60_35-xen-3-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:25:55Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
suse-su-2016:2178-1
Vulnerability from csaf_suse
Published
2016-08-29 09:26
Modified
2016-08-29 09:26
Summary
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Notes
Title of the patch
Security update for Linux Kernel Live Patch 3 for SLE 12 SP1
Description of the patch
This update for the Linux Kernel 3.12.53-60_30 fixes several issues.
The following security bugs were fixed:
- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a 'double fetch' vulnerability (bsc#991667).
- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).
- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).
Patchnames
SUSE-SLE-Live-Patching-12-2016-1286
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "title": "Title of the patch" }, { "category": "description", "text": "This update for the Linux Kernel 3.12.53-60_30 fixes several issues.\n\nThe following security bugs were fixed:\n- CVE-2016-6480: Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \u0027double fetch\u0027 vulnerability (bsc#991667).\n- CVE-2016-5829: Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel allowed local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call (bsc#986573).\n- CVE-2016-4997: The compat IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel allowed local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement (bsc#986377).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-SLE-Live-Patching-12-2016-1286", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2016_2178-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2016:2178-1", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162178-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2016:2178-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2016-August/002234.html" }, { "category": "self", "summary": "SUSE Bug 986377", "url": "https://bugzilla.suse.com/986377" }, { "category": "self", "summary": "SUSE Bug 986573", "url": "https://bugzilla.suse.com/986573" }, { "category": "self", "summary": "SUSE Bug 991667", "url": "https://bugzilla.suse.com/991667" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" } ], "title": "Security update for Linux Kernel Live Patch 3 for SLE 12 SP1", "tracking": { "current_release_date": "2016-08-29T09:26:04Z", "generator": { "date": "2016-08-29T09:26:04Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2016:2178-1", "initial_release_date": "2016-08-29T09:26:04Z", "revision_history": [ { "date": "2016-08-29T09:26:04Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64", "product": { "name": "kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64", "product_id": "kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12", "product": { "name": "SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12", "product_id": "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" }, "product_reference": "kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:04Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:04Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-default-4-2.1.x86_64", "SUSE Linux Enterprise Live Patching 12:kgraft-patch-3_12_53-60_30-xen-4-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2016-08-29T09:26:04Z", "details": "moderate" } ], "title": "CVE-2016-6480" } ] }
opensuse-su-2024:10128-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
kernel-debug-4.8.13-1.1 on GA media
Notes
Title of the patch
kernel-debug-4.8.13-1.1 on GA media
Description of the patch
These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10128
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "kernel-debug-4.8.13-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the kernel-debug-4.8.13-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10128", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10128-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2009-3939 page", "url": "https://www.suse.com/security/cve/CVE-2009-3939/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4026 page", "url": "https://www.suse.com/security/cve/CVE-2009-4026/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4027 page", "url": "https://www.suse.com/security/cve/CVE-2009-4027/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4131 page", "url": "https://www.suse.com/security/cve/CVE-2009-4131/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4138 page", "url": "https://www.suse.com/security/cve/CVE-2009-4138/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4536 page", "url": "https://www.suse.com/security/cve/CVE-2009-4536/" }, { "category": "self", "summary": "SUSE CVE CVE-2009-4538 page", "url": "https://www.suse.com/security/cve/CVE-2009-4538/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1146 page", "url": "https://www.suse.com/security/cve/CVE-2010-1146/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1436 page", "url": "https://www.suse.com/security/cve/CVE-2010-1436/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-1641 page", "url": "https://www.suse.com/security/cve/CVE-2010-1641/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2066 page", "url": "https://www.suse.com/security/cve/CVE-2010-2066/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2942 page", "url": "https://www.suse.com/security/cve/CVE-2010-2942/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2954 page", "url": "https://www.suse.com/security/cve/CVE-2010-2954/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-2955 page", "url": "https://www.suse.com/security/cve/CVE-2010-2955/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3081 page", "url": "https://www.suse.com/security/cve/CVE-2010-3081/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3296 page", "url": "https://www.suse.com/security/cve/CVE-2010-3296/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3297 page", "url": "https://www.suse.com/security/cve/CVE-2010-3297/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3298 page", "url": "https://www.suse.com/security/cve/CVE-2010-3298/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3301 page", "url": "https://www.suse.com/security/cve/CVE-2010-3301/" }, { "category": "self", "summary": "SUSE CVE CVE-2010-3310 page", "url": "https://www.suse.com/security/cve/CVE-2010-3310/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0711 page", "url": "https://www.suse.com/security/cve/CVE-2011-0711/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-0712 page", "url": "https://www.suse.com/security/cve/CVE-2011-0712/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1020 page", "url": "https://www.suse.com/security/cve/CVE-2011-1020/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1180 page", "url": "https://www.suse.com/security/cve/CVE-2011-1180/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1577 page", "url": "https://www.suse.com/security/cve/CVE-2011-1577/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-1581 page", "url": "https://www.suse.com/security/cve/CVE-2011-1581/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-2203 page", "url": "https://www.suse.com/security/cve/CVE-2011-2203/" }, { "category": "self", "summary": "SUSE CVE CVE-2011-4604 page", "url": "https://www.suse.com/security/cve/CVE-2011-4604/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-0056 page", "url": "https://www.suse.com/security/cve/CVE-2012-0056/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3412 page", "url": "https://www.suse.com/security/cve/CVE-2012-3412/" }, { "category": "self", "summary": "SUSE CVE CVE-2012-3520 page", "url": "https://www.suse.com/security/cve/CVE-2012-3520/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0160 page", "url": "https://www.suse.com/security/cve/CVE-2013-0160/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0231 page", "url": "https://www.suse.com/security/cve/CVE-2013-0231/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-0913 page", "url": "https://www.suse.com/security/cve/CVE-2013-0913/" }, { "category": "self", "summary": "SUSE CVE CVE-2013-2850 page", "url": "https://www.suse.com/security/cve/CVE-2013-2850/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0038 page", "url": "https://www.suse.com/security/cve/CVE-2014-0038/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0196 page", "url": "https://www.suse.com/security/cve/CVE-2014-0196/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-0691 page", "url": "https://www.suse.com/security/cve/CVE-2014-0691/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-8133 page", "url": "https://www.suse.com/security/cve/CVE-2014-8133/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-1333 page", "url": "https://www.suse.com/security/cve/CVE-2015-1333/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7550 page", "url": "https://www.suse.com/security/cve/CVE-2015-7550/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7884 page", "url": "https://www.suse.com/security/cve/CVE-2015-7884/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-7885 page", "url": "https://www.suse.com/security/cve/CVE-2015-7885/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8539 page", "url": "https://www.suse.com/security/cve/CVE-2015-8539/" }, { "category": "self", "summary": "SUSE CVE CVE-2015-8660 page", "url": "https://www.suse.com/security/cve/CVE-2015-8660/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0723 page", "url": "https://www.suse.com/security/cve/CVE-2016-0723/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-0728 page", "url": "https://www.suse.com/security/cve/CVE-2016-0728/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1237 page", "url": "https://www.suse.com/security/cve/CVE-2016-1237/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-1583 page", "url": "https://www.suse.com/security/cve/CVE-2016-1583/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2184 page", "url": "https://www.suse.com/security/cve/CVE-2016-2184/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2185 page", "url": "https://www.suse.com/security/cve/CVE-2016-2185/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2186 page", "url": "https://www.suse.com/security/cve/CVE-2016-2186/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-2384 page", "url": "https://www.suse.com/security/cve/CVE-2016-2384/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3134 page", "url": "https://www.suse.com/security/cve/CVE-2016-3134/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3135 page", "url": "https://www.suse.com/security/cve/CVE-2016-3135/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3136 page", "url": "https://www.suse.com/security/cve/CVE-2016-3136/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3140 page", "url": "https://www.suse.com/security/cve/CVE-2016-3140/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3689 page", "url": "https://www.suse.com/security/cve/CVE-2016-3689/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-3713 page", "url": "https://www.suse.com/security/cve/CVE-2016-3713/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4470 page", "url": "https://www.suse.com/security/cve/CVE-2016-4470/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4485 page", "url": "https://www.suse.com/security/cve/CVE-2016-4485/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4486 page", "url": "https://www.suse.com/security/cve/CVE-2016-4486/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4557 page", "url": "https://www.suse.com/security/cve/CVE-2016-4557/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4558 page", "url": "https://www.suse.com/security/cve/CVE-2016-4558/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4569 page", "url": "https://www.suse.com/security/cve/CVE-2016-4569/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4578 page", "url": "https://www.suse.com/security/cve/CVE-2016-4578/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4951 page", "url": "https://www.suse.com/security/cve/CVE-2016-4951/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4997 page", "url": "https://www.suse.com/security/cve/CVE-2016-4997/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-4998 page", "url": "https://www.suse.com/security/cve/CVE-2016-4998/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5195 page", "url": "https://www.suse.com/security/cve/CVE-2016-5195/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5244 page", "url": "https://www.suse.com/security/cve/CVE-2016-5244/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-5829 page", "url": "https://www.suse.com/security/cve/CVE-2016-5829/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6187 page", "url": "https://www.suse.com/security/cve/CVE-2016-6187/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6480 page", "url": "https://www.suse.com/security/cve/CVE-2016-6480/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6516 page", "url": "https://www.suse.com/security/cve/CVE-2016-6516/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-6828 page", "url": "https://www.suse.com/security/cve/CVE-2016-6828/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7039 page", "url": "https://www.suse.com/security/cve/CVE-2016-7039/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7042 page", "url": "https://www.suse.com/security/cve/CVE-2016-7042/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7425 page", "url": "https://www.suse.com/security/cve/CVE-2016-7425/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-7913 page", "url": "https://www.suse.com/security/cve/CVE-2016-7913/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9555 page", "url": "https://www.suse.com/security/cve/CVE-2016-9555/" }, { "category": "self", "summary": "SUSE CVE CVE-2016-9576 page", "url": "https://www.suse.com/security/cve/CVE-2016-9576/" } ], "title": "kernel-debug-4.8.13-1.1 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10128-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-4.8.13-1.1.aarch64", "product_id": "kernel-debug-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-base-4.8.13-1.1.aarch64", "product_id": "kernel-debug-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64", "product_id": "kernel-debug-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-4.8.13-1.1.aarch64", "product_id": "kernel-default-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-base-4.8.13-1.1.aarch64", "product_id": "kernel-default-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-default-devel-4.8.13-1.1.aarch64", "product_id": "kernel-default-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-devel-4.8.13-1.1.aarch64", "product_id": "kernel-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-4.8.13-1.1.aarch64", "product_id": "kernel-docs-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-html-4.8.13-1.1.aarch64", "product_id": "kernel-docs-html-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64", "product_id": "kernel-docs-pdf-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.aarch64", "product": { "name": "kernel-macros-4.8.13-1.1.aarch64", "product_id": "kernel-macros-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-build-4.8.13-1.1.aarch64", "product_id": "kernel-obs-build-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64", "product_id": "kernel-obs-qa-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-4.8.13-1.1.aarch64", "product_id": "kernel-pae-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-base-4.8.13-1.1.aarch64", "product_id": "kernel-pae-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64", "product_id": "kernel-pae-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-4.8.13-1.1.aarch64", "product_id": "kernel-source-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-source-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.aarch64", "product": { "name": "kernel-syms-4.8.13-1.1.aarch64", "product_id": "kernel-syms-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-base-4.8.13-1.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-debug-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-4.8.13-1.1.ppc64le", "product_id": "kernel-default-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-base-4.8.13-1.1.ppc64le", "product_id": "kernel-default-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-default-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-html-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "product_id": "kernel-docs-pdf-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.ppc64le", "product": { "name": "kernel-macros-4.8.13-1.1.ppc64le", "product_id": "kernel-macros-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-build-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le", "product_id": "kernel-obs-qa-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-pae-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-4.8.13-1.1.ppc64le", "product_id": "kernel-source-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-source-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syms-4.8.13-1.1.ppc64le", "product_id": "kernel-syms-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-base-4.8.13-1.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "product_id": "kernel-vanilla-devel-4.8.13-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-4.8.13-1.1.s390x", "product_id": "kernel-debug-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-base-4.8.13-1.1.s390x", "product_id": "kernel-debug-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-debug-devel-4.8.13-1.1.s390x", "product_id": "kernel-debug-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.s390x", "product": { "name": "kernel-default-4.8.13-1.1.s390x", "product_id": "kernel-default-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.s390x", "product": { "name": "kernel-default-base-4.8.13-1.1.s390x", "product_id": "kernel-default-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-default-devel-4.8.13-1.1.s390x", "product_id": "kernel-default-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-devel-4.8.13-1.1.s390x", "product_id": "kernel-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-4.8.13-1.1.s390x", "product_id": "kernel-docs-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-html-4.8.13-1.1.s390x", "product_id": "kernel-docs-html-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x", "product_id": "kernel-docs-pdf-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.s390x", "product": { "name": "kernel-macros-4.8.13-1.1.s390x", "product_id": "kernel-macros-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-build-4.8.13-1.1.s390x", "product_id": "kernel-obs-build-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product": { "name": "kernel-obs-qa-4.8.13-1.1.s390x", "product_id": "kernel-obs-qa-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-4.8.13-1.1.s390x", "product_id": "kernel-pae-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-base-4.8.13-1.1.s390x", "product_id": "kernel-pae-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-pae-devel-4.8.13-1.1.s390x", "product_id": "kernel-pae-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.s390x", "product": { "name": "kernel-source-4.8.13-1.1.s390x", "product_id": "kernel-source-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-source-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.s390x", "product": { "name": "kernel-syms-4.8.13-1.1.s390x", "product_id": "kernel-syms-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-base-4.8.13-1.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x", "product_id": "kernel-vanilla-devel-4.8.13-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-4.8.13-1.1.x86_64", "product_id": "kernel-debug-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-base-4.8.13-1.1.x86_64", "product_id": "kernel-debug-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64", "product_id": "kernel-debug-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-4.8.13-1.1.x86_64", "product_id": "kernel-default-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-base-4.8.13-1.1.x86_64", "product_id": "kernel-default-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-default-devel-4.8.13-1.1.x86_64", "product_id": "kernel-default-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-devel-4.8.13-1.1.x86_64", "product_id": "kernel-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-4.8.13-1.1.x86_64", "product_id": "kernel-docs-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-html-4.8.13-1.1.x86_64", "product_id": "kernel-docs-html-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64", "product_id": "kernel-docs-pdf-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-macros-4.8.13-1.1.x86_64", "product": { "name": "kernel-macros-4.8.13-1.1.x86_64", "product_id": "kernel-macros-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-build-4.8.13-1.1.x86_64", "product_id": "kernel-obs-build-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64", "product_id": "kernel-obs-qa-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-4.8.13-1.1.x86_64", "product_id": "kernel-pae-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-base-4.8.13-1.1.x86_64", "product_id": "kernel-pae-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64", "product_id": "kernel-pae-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-4.8.13-1.1.x86_64", "product_id": "kernel-source-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-source-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.8.13-1.1.x86_64", "product": { "name": "kernel-syms-4.8.13-1.1.x86_64", "product_id": "kernel-syms-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "product_id": "kernel-syzkaller-devel-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-base-4.8.13-1.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "product_id": "kernel-vanilla-devel-4.8.13-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-debug-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-default-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-default-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-default-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-html-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-html-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-html-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-pdf-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64" }, "product_reference": "kernel-docs-pdf-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64" }, "product_reference": "kernel-macros-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-macros-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x" }, "product_reference": "kernel-macros-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64" }, "product_reference": "kernel-macros-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-build-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-build-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-build-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64" }, "product_reference": "kernel-obs-qa-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-pae-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-source-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syms-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syms-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x" }, "product_reference": "kernel-syms-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syms-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syzkaller-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-syzkaller-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.8.13-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.8.13-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3939", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-3939" } ], "notes": [ { "category": "general", "text": "The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-3939", "url": "https://www.suse.com/security/cve/CVE-2009-3939" }, { "category": "external", "summary": "SUSE Bug 555173 for CVE-2009-3939", "url": "https://bugzilla.suse.com/555173" }, { "category": "external", "summary": "SUSE Bug 557180 for CVE-2009-3939", "url": "https://bugzilla.suse.com/557180" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-3939" }, { "cve": "CVE-2009-4026", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4026" } ], "notes": [ { "category": "general", "text": "The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous \"code shuffling patch.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4026", "url": "https://www.suse.com/security/cve/CVE-2009-4026" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4026", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4026" }, { "cve": "CVE-2009-4027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4027" } ], "notes": [ { "category": "general", "text": "Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4027", "url": "https://www.suse.com/security/cve/CVE-2009-4027" }, { "category": "external", "summary": "SUSE Bug 558267 for CVE-2009-4027", "url": "https://bugzilla.suse.com/558267" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4027" }, { "cve": "CVE-2009-4131", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4131" } ], "notes": [ { "category": "general", "text": "The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4131", "url": "https://www.suse.com/security/cve/CVE-2009-4131" }, { "category": "external", "summary": "SUSE Bug 561018 for CVE-2009-4131", "url": "https://bugzilla.suse.com/561018" }, { "category": "external", "summary": "SUSE Bug 564380 for CVE-2009-4131", "url": "https://bugzilla.suse.com/564380" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4131" }, { "cve": "CVE-2009-4138", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4138" } ], "notes": [ { "category": "general", "text": "drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4138", "url": "https://www.suse.com/security/cve/CVE-2009-4138" }, { "category": "external", "summary": "SUSE Bug 564712 for CVE-2009-4138", "url": "https://bugzilla.suse.com/564712" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2009-4138" }, { "cve": "CVE-2009-4536", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4536" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4536", "url": "https://www.suse.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4536", "url": "https://bugzilla.suse.com/567376" }, { "category": "external", "summary": "SUSE Bug 583434 for CVE-2009-4536", "url": "https://bugzilla.suse.com/583434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2009-4536" }, { "cve": "CVE-2009-4538", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2009-4538" } ], "notes": [ { "category": "general", "text": "drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2009-4538", "url": "https://www.suse.com/security/cve/CVE-2009-4538" }, { "category": "external", "summary": "SUSE Bug 567376 for CVE-2009-4538", "url": "https://bugzilla.suse.com/567376" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2009-4538" }, { "cve": "CVE-2010-1146", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1146" } ], "notes": [ { "category": "general", "text": "The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1146", "url": "https://www.suse.com/security/cve/CVE-2010-1146" }, { "category": "external", "summary": "SUSE Bug 593906 for CVE-2010-1146", "url": "https://bugzilla.suse.com/593906" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1146" }, { "cve": "CVE-2010-1436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1436" } ], "notes": [ { "category": "general", "text": "gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1436", "url": "https://www.suse.com/security/cve/CVE-2010-1436" }, { "category": "external", "summary": "SUSE Bug 599957 for CVE-2010-1436", "url": "https://bugzilla.suse.com/599957" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1436" }, { "cve": "CVE-2010-1641", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-1641" } ], "notes": [ { "category": "general", "text": "The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-1641", "url": "https://www.suse.com/security/cve/CVE-2010-1641" }, { "category": "external", "summary": "SUSE Bug 608576 for CVE-2010-1641", "url": "https://bugzilla.suse.com/608576" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-1641" }, { "cve": "CVE-2010-2066", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2066" } ], "notes": [ { "category": "general", "text": "The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2066", "url": "https://www.suse.com/security/cve/CVE-2010-2066" }, { "category": "external", "summary": "SUSE Bug 612457 for CVE-2010-2066", "url": "https://bugzilla.suse.com/612457" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2066" }, { "cve": "CVE-2010-2942", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2942" } ], "notes": [ { "category": "general", "text": "The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2942", "url": "https://www.suse.com/security/cve/CVE-2010-2942" }, { "category": "external", "summary": "SUSE Bug 632309 for CVE-2010-2942", "url": "https://bugzilla.suse.com/632309" }, { "category": "external", "summary": "SUSE Bug 642324 for CVE-2010-2942", "url": "https://bugzilla.suse.com/642324" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2942" }, { "cve": "CVE-2010-2954", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2954" } ], "notes": [ { "category": "general", "text": "The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2954", "url": "https://www.suse.com/security/cve/CVE-2010-2954" }, { "category": "external", "summary": "SUSE Bug 636112 for CVE-2010-2954", "url": "https://bugzilla.suse.com/636112" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2954" }, { "cve": "CVE-2010-2955", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-2955" } ], "notes": [ { "category": "general", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-2955", "url": "https://www.suse.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "SUSE Bug 635413 for CVE-2010-2955", "url": "https://bugzilla.suse.com/635413" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2010-2955" }, { "cve": "CVE-2010-3081", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3081" } ], "notes": [ { "category": "general", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3081", "url": "https://www.suse.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "SUSE Bug 639709 for CVE-2010-3081", "url": "https://bugzilla.suse.com/639709" }, { "category": "external", "summary": "SUSE Bug 641575 for CVE-2010-3081", "url": "https://bugzilla.suse.com/641575" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2010-3081", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3081" }, { "cve": "CVE-2010-3296", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3296" } ], "notes": [ { "category": "general", "text": "The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3296", "url": "https://www.suse.com/security/cve/CVE-2010-3296" }, { "category": "external", "summary": "SUSE Bug 639481 for CVE-2010-3296", "url": "https://bugzilla.suse.com/639481" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3296", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3296" }, { "cve": "CVE-2010-3297", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3297" } ], "notes": [ { "category": "general", "text": "The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3297", "url": "https://www.suse.com/security/cve/CVE-2010-3297" }, { "category": "external", "summary": "SUSE Bug 639482 for CVE-2010-3297", "url": "https://bugzilla.suse.com/639482" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3297", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3297" }, { "cve": "CVE-2010-3298", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3298" } ], "notes": [ { "category": "general", "text": "The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3298", "url": "https://www.suse.com/security/cve/CVE-2010-3298" }, { "category": "external", "summary": "SUSE Bug 639483 for CVE-2010-3298", "url": "https://bugzilla.suse.com/639483" }, { "category": "external", "summary": "SUSE Bug 649187 for CVE-2010-3298", "url": "https://bugzilla.suse.com/649187" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2010-3298" }, { "cve": "CVE-2010-3301", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3301" } ], "notes": [ { "category": "general", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3301", "url": "https://www.suse.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "SUSE Bug 639708 for CVE-2010-3301", "url": "https://bugzilla.suse.com/639708" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3301" }, { "cve": "CVE-2010-3310", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2010-3310" } ], "notes": [ { "category": "general", "text": "Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2010-3310", "url": "https://www.suse.com/security/cve/CVE-2010-3310" }, { "category": "external", "summary": "SUSE Bug 640721 for CVE-2010-3310", "url": "https://bugzilla.suse.com/640721" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2010-3310" }, { "cve": "CVE-2011-0711", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0711" } ], "notes": [ { "category": "general", "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0711", "url": "https://www.suse.com/security/cve/CVE-2011-0711" }, { "category": "external", "summary": "SUSE Bug 672505 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672505" }, { "category": "external", "summary": "SUSE Bug 672524 for CVE-2011-0711", "url": "https://bugzilla.suse.com/672524" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-0711" }, { "cve": "CVE-2011-0712", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-0712" } ], "notes": [ { "category": "general", "text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-0712", "url": "https://www.suse.com/security/cve/CVE-2011-0712" }, { "category": "external", "summary": "SUSE Bug 672499 for CVE-2011-0712", "url": "https://bugzilla.suse.com/672499" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-0712" }, { "cve": "CVE-2011-1020", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1020" } ], "notes": [ { "category": "general", "text": "The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1020", "url": "https://www.suse.com/security/cve/CVE-2011-1020" }, { "category": "external", "summary": "SUSE Bug 674982 for CVE-2011-1020", "url": "https://bugzilla.suse.com/674982" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1020" }, { "cve": "CVE-2011-1180", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1180" } ], "notes": [ { "category": "general", "text": "Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1180", "url": "https://www.suse.com/security/cve/CVE-2011-1180" }, { "category": "external", "summary": "SUSE Bug 681497 for CVE-2011-1180", "url": "https://bugzilla.suse.com/681497" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "critical" } ], "title": "CVE-2011-1180" }, { "cve": "CVE-2011-1577", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1577" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1577", "url": "https://www.suse.com/security/cve/CVE-2011-1577" }, { "category": "external", "summary": "SUSE Bug 687113 for CVE-2011-1577", "url": "https://bugzilla.suse.com/687113" }, { "category": "external", "summary": "SUSE Bug 692784 for CVE-2011-1577", "url": "https://bugzilla.suse.com/692784" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2011-1577" }, { "cve": "CVE-2011-1581", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-1581" } ], "notes": [ { "category": "general", "text": "The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-1581", "url": "https://www.suse.com/security/cve/CVE-2011-1581" }, { "category": "external", "summary": "SUSE Bug 687116 for CVE-2011-1581", "url": "https://bugzilla.suse.com/687116" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2011-1581" }, { "cve": "CVE-2011-2203", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-2203" } ], "notes": [ { "category": "general", "text": "The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-2203", "url": "https://www.suse.com/security/cve/CVE-2011-2203" }, { "category": "external", "summary": "SUSE Bug 699709 for CVE-2011-2203", "url": "https://bugzilla.suse.com/699709" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-2203" }, { "cve": "CVE-2011-4604", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2011-4604" } ], "notes": [ { "category": "general", "text": "The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2011-4604", "url": "https://www.suse.com/security/cve/CVE-2011-4604" }, { "category": "external", "summary": "SUSE Bug 736149 for CVE-2011-4604", "url": "https://bugzilla.suse.com/736149" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2011-4604" }, { "cve": "CVE-2012-0056", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-0056" } ], "notes": [ { "category": "general", "text": "The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/\u003cpid\u003e/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-0056", "url": "https://www.suse.com/security/cve/CVE-2012-0056" }, { "category": "external", "summary": "SUSE Bug 1171985 for CVE-2012-0056", "url": "https://bugzilla.suse.com/1171985" }, { "category": "external", "summary": "SUSE Bug 742028 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742028" }, { "category": "external", "summary": "SUSE Bug 742279 for CVE-2012-0056", "url": "https://bugzilla.suse.com/742279" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2012-0056" }, { "cve": "CVE-2012-3412", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3412" } ], "notes": [ { "category": "general", "text": "The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3412", "url": "https://www.suse.com/security/cve/CVE-2012-3412" }, { "category": "external", "summary": "SUSE Bug 774523 for CVE-2012-3412", "url": "https://bugzilla.suse.com/774523" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2012-3412" }, { "cve": "CVE-2012-3520", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2012-3520" } ], "notes": [ { "category": "general", "text": "The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2012-3520", "url": "https://www.suse.com/security/cve/CVE-2012-3520" }, { "category": "external", "summary": "SUSE Bug 776925 for CVE-2012-3520", "url": "https://bugzilla.suse.com/776925" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2012-3520" }, { "cve": "CVE-2013-0160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0160" } ], "notes": [ { "category": "general", "text": "The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0160", "url": "https://www.suse.com/security/cve/CVE-2013-0160" }, { "category": "external", "summary": "SUSE Bug 797175 for CVE-2013-0160", "url": "https://bugzilla.suse.com/797175" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0160", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0160", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0160" }, { "cve": "CVE-2013-0231", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0231" } ], "notes": [ { "category": "general", "text": "The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0231", "url": "https://www.suse.com/security/cve/CVE-2013-0231" }, { "category": "external", "summary": "SUSE Bug 801178 for CVE-2013-0231", "url": "https://bugzilla.suse.com/801178" }, { "category": "external", "summary": "SUSE Bug 841063 for CVE-2013-0231", "url": "https://bugzilla.suse.com/841063" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0231", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0231" }, { "cve": "CVE-2013-0913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-0913" } ], "notes": [ { "category": "general", "text": "Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-0913", "url": "https://www.suse.com/security/cve/CVE-2013-0913" }, { "category": "external", "summary": "SUSE Bug 808829 for CVE-2013-0913", "url": "https://bugzilla.suse.com/808829" }, { "category": "external", "summary": "SUSE Bug 871595 for CVE-2013-0913", "url": "https://bugzilla.suse.com/871595" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2013-0913" }, { "cve": "CVE-2013-2850", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2013-2850" } ], "notes": [ { "category": "general", "text": "Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2013-2850", "url": "https://www.suse.com/security/cve/CVE-2013-2850" }, { "category": "external", "summary": "SUSE Bug 821560 for CVE-2013-2850", "url": "https://bugzilla.suse.com/821560" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2013-2850" }, { "cve": "CVE-2014-0038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0038" } ], "notes": [ { "category": "general", "text": "The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0038", "url": "https://www.suse.com/security/cve/CVE-2014-0038" }, { "category": "external", "summary": "SUSE Bug 860993 for CVE-2014-0038", "url": "https://bugzilla.suse.com/860993" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0038" }, { "cve": "CVE-2014-0196", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0196" } ], "notes": [ { "category": "general", "text": "The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the \"LECHO \u0026 !OPOST\" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0196", "url": "https://www.suse.com/security/cve/CVE-2014-0196" }, { "category": "external", "summary": "SUSE Bug 871252 for CVE-2014-0196", "url": "https://bugzilla.suse.com/871252" }, { "category": "external", "summary": "SUSE Bug 875690 for CVE-2014-0196", "url": "https://bugzilla.suse.com/875690" }, { "category": "external", "summary": "SUSE Bug 877345 for CVE-2014-0196", "url": "https://bugzilla.suse.com/877345" }, { "category": "external", "summary": "SUSE Bug 879878 for CVE-2014-0196", "url": "https://bugzilla.suse.com/879878" }, { "category": "external", "summary": "SUSE Bug 933423 for CVE-2014-0196", "url": "https://bugzilla.suse.com/933423" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2014-0196" }, { "cve": "CVE-2014-0691", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "notes": [ { "category": "general", "text": "Cisco WebEx Meetings Server before 1.1 uses meeting IDs with insufficient entropy, which makes it easier for remote attackers to bypass authentication and join arbitrary meetings without a password, aka Bug ID CSCuc79643.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-0691", "url": "https://www.suse.com/security/cve/CVE-2014-0691" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.3, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-0691" }, { "cve": "CVE-2014-8133", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-8133" } ], "notes": [ { "category": "general", "text": "arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-8133", "url": "https://www.suse.com/security/cve/CVE-2014-8133" }, { "category": "external", "summary": "SUSE Bug 817142 for CVE-2014-8133", "url": "https://bugzilla.suse.com/817142" }, { "category": "external", "summary": "SUSE Bug 906545 for CVE-2014-8133", "url": "https://bugzilla.suse.com/906545" }, { "category": "external", "summary": "SUSE Bug 907818 for CVE-2014-8133", "url": "https://bugzilla.suse.com/907818" }, { "category": "external", "summary": "SUSE Bug 909077 for CVE-2014-8133", "url": "https://bugzilla.suse.com/909077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2014-8133" }, { "cve": "CVE-2015-1333", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-1333" } ], "notes": [ { "category": "general", "text": "Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-1333", "url": "https://www.suse.com/security/cve/CVE-2015-1333" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 1185451 for CVE-2015-1333", "url": "https://bugzilla.suse.com/1185451" }, { "category": "external", "summary": "SUSE Bug 938645 for CVE-2015-1333", "url": "https://bugzilla.suse.com/938645" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2015-1333" }, { "cve": "CVE-2015-7550", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7550" } ], "notes": [ { "category": "general", "text": "The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7550", "url": "https://www.suse.com/security/cve/CVE-2015-7550" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2015-7550", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 958951 for CVE-2015-7550", "url": "https://bugzilla.suse.com/958951" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7550" }, { "cve": "CVE-2015-7884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7884" } ], "notes": [ { "category": "general", "text": "The vivid_fb_ioctl function in drivers/media/platform/vivid/vivid-osd.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7884", "url": "https://www.suse.com/security/cve/CVE-2015-7884" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7884", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7884", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7884" }, { "cve": "CVE-2015-7885", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-7885" } ], "notes": [ { "category": "general", "text": "The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-7885", "url": "https://www.suse.com/security/cve/CVE-2015-7885" }, { "category": "external", "summary": "SUSE Bug 1126909 for CVE-2015-7885", "url": "https://bugzilla.suse.com/1126909" }, { "category": "external", "summary": "SUSE Bug 951626 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951626" }, { "category": "external", "summary": "SUSE Bug 951627 for CVE-2015-7885", "url": "https://bugzilla.suse.com/951627" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2015-7885" }, { "cve": "CVE-2015-8539", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8539" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (BUG) via crafted keyctl commands that negatively instantiate a key, related to security/keys/encrypted-keys/encrypted.c, security/keys/trusted.c, and security/keys/user_defined.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8539", "url": "https://www.suse.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2015-8539", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 781018 for CVE-2015-8539", "url": "https://bugzilla.suse.com/781018" }, { "category": "external", "summary": "SUSE Bug 958463 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958463" }, { "category": "external", "summary": "SUSE Bug 958601 for CVE-2015-8539", "url": "https://bugzilla.suse.com/958601" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8539" }, { "cve": "CVE-2015-8660", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2015-8660" } ], "notes": [ { "category": "general", "text": "The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2015-8660", "url": "https://www.suse.com/security/cve/CVE-2015-8660" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2015-8660", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 960281 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960281" }, { "category": "external", "summary": "SUSE Bug 960329 for CVE-2015-8660", "url": "https://bugzilla.suse.com/960329" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2015-8660", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2015-8660" }, { "cve": "CVE-2016-0723", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0723" } ], "notes": [ { "category": "general", "text": "Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0723", "url": "https://www.suse.com/security/cve/CVE-2016-0723" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-0723", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 961500 for CVE-2016-0723", "url": "https://bugzilla.suse.com/961500" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-0723" }, { "cve": "CVE-2016-0728", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-0728" } ], "notes": [ { "category": "general", "text": "The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-0728", "url": "https://www.suse.com/security/cve/CVE-2016-0728" }, { "category": "external", "summary": "SUSE Bug 923755 for CVE-2016-0728", "url": "https://bugzilla.suse.com/923755" }, { "category": "external", "summary": "SUSE Bug 962075 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962075" }, { "category": "external", "summary": "SUSE Bug 962078 for CVE-2016-0728", "url": "https://bugzilla.suse.com/962078" }, { "category": "external", "summary": "SUSE Bug 963994 for CVE-2016-0728", "url": "https://bugzilla.suse.com/963994" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-0728" }, { "cve": "CVE-2016-1237", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1237" } ], "notes": [ { "category": "general", "text": "nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1237", "url": "https://www.suse.com/security/cve/CVE-2016-1237" }, { "category": "external", "summary": "SUSE Bug 986570 for CVE-2016-1237", "url": "https://bugzilla.suse.com/986570" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-1237" }, { "cve": "CVE-2016-1583", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-1583" } ], "notes": [ { "category": "general", "text": "The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-1583", "url": "https://www.suse.com/security/cve/CVE-2016-1583" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-1583", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 983143 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983143" }, { "category": "external", "summary": "SUSE Bug 983144 for CVE-2016-1583", "url": "https://bugzilla.suse.com/983144" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-1583" }, { "cve": "CVE-2016-2184", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2184" } ], "notes": [ { "category": "general", "text": "The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2184", "url": "https://www.suse.com/security/cve/CVE-2016-2184" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2184", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971125 for CVE-2016-2184", "url": "https://bugzilla.suse.com/971125" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2184" }, { "cve": "CVE-2016-2185", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2185" } ], "notes": [ { "category": "general", "text": "The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2185", "url": "https://www.suse.com/security/cve/CVE-2016-2185" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2185", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 971124 for CVE-2016-2185", "url": "https://bugzilla.suse.com/971124" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2185" }, { "cve": "CVE-2016-2186", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2186" } ], "notes": [ { "category": "general", "text": "The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2186", "url": "https://www.suse.com/security/cve/CVE-2016-2186" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2186", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970958 for CVE-2016-2186", "url": "https://bugzilla.suse.com/970958" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2186" }, { "cve": "CVE-2016-2384", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-2384" } ], "notes": [ { "category": "general", "text": "Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-2384", "url": "https://www.suse.com/security/cve/CVE-2016-2384" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-2384", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 966693 for CVE-2016-2384", "url": "https://bugzilla.suse.com/966693" }, { "category": "external", "summary": "SUSE Bug 967773 for CVE-2016-2384", "url": "https://bugzilla.suse.com/967773" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-2384" }, { "cve": "CVE-2016-3134", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3134" } ], "notes": [ { "category": "general", "text": "The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3134", "url": "https://www.suse.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-3134", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 971126 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971126" }, { "category": "external", "summary": "SUSE Bug 971793 for CVE-2016-3134", "url": "https://bugzilla.suse.com/971793" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-3134", "url": "https://bugzilla.suse.com/986377" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3134" }, { "cve": "CVE-2016-3135", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3135" } ], "notes": [ { "category": "general", "text": "Integer overflow in the xt_alloc_table_info function in net/netfilter/x_tables.c in the Linux kernel through 4.5.2 on 32-bit platforms allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3135", "url": "https://www.suse.com/security/cve/CVE-2016-3135" }, { "category": "external", "summary": "SUSE Bug 970904 for CVE-2016-3135", "url": "https://bugzilla.suse.com/970904" }, { "category": "external", "summary": "SUSE Bug 971794 for CVE-2016-3135", "url": "https://bugzilla.suse.com/971794" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-3135" }, { "cve": "CVE-2016-3136", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3136" } ], "notes": [ { "category": "general", "text": "The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3136", "url": "https://www.suse.com/security/cve/CVE-2016-3136" }, { "category": "external", "summary": "SUSE Bug 970955 for CVE-2016-3136", "url": "https://bugzilla.suse.com/970955" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3136" }, { "cve": "CVE-2016-3140", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3140" } ], "notes": [ { "category": "general", "text": "The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3140", "url": "https://www.suse.com/security/cve/CVE-2016-3140" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-3140", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 970892 for CVE-2016-3140", "url": "https://bugzilla.suse.com/970892" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-3140" }, { "cve": "CVE-2016-3689", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3689" } ], "notes": [ { "category": "general", "text": "The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3689", "url": "https://www.suse.com/security/cve/CVE-2016-3689" }, { "category": "external", "summary": "SUSE Bug 971628 for CVE-2016-3689", "url": "https://bugzilla.suse.com/971628" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3689" }, { "cve": "CVE-2016-3713", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-3713" } ], "notes": [ { "category": "general", "text": "The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-3713", "url": "https://www.suse.com/security/cve/CVE-2016-3713" }, { "category": "external", "summary": "SUSE Bug 979715 for CVE-2016-3713", "url": "https://bugzilla.suse.com/979715" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-3713", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-3713" }, { "cve": "CVE-2016-4470", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4470" } ], "notes": [ { "category": "general", "text": "The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4470", "url": "https://www.suse.com/security/cve/CVE-2016-4470" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4470", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 984755 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984755" }, { "category": "external", "summary": "SUSE Bug 984764 for CVE-2016-4470", "url": "https://bugzilla.suse.com/984764" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4470", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4470" }, { "cve": "CVE-2016-4485", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4485" } ], "notes": [ { "category": "general", "text": "The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4485", "url": "https://www.suse.com/security/cve/CVE-2016-4485" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4485", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978821 for CVE-2016-4485", "url": "https://bugzilla.suse.com/978821" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4485" }, { "cve": "CVE-2016-4486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4486" } ], "notes": [ { "category": "general", "text": "The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4486", "url": "https://www.suse.com/security/cve/CVE-2016-4486" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4486", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 978822 for CVE-2016-4486", "url": "https://bugzilla.suse.com/978822" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4486" }, { "cve": "CVE-2016-4557", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4557" } ], "notes": [ { "category": "general", "text": "The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4557", "url": "https://www.suse.com/security/cve/CVE-2016-4557" }, { "category": "external", "summary": "SUSE Bug 979018 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979018" }, { "category": "external", "summary": "SUSE Bug 979077 for CVE-2016-4557", "url": "https://bugzilla.suse.com/979077" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4557" }, { "cve": "CVE-2016-4558", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4558" } ], "notes": [ { "category": "general", "text": "The BPF subsystem in the Linux kernel before 4.5.5 mishandles reference counts, which allows local users to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted application on (1) a system with more than 32 Gb of memory, related to the program reference count or (2) a 1 Tb system, related to the map reference count.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4558", "url": "https://www.suse.com/security/cve/CVE-2016-4558" }, { "category": "external", "summary": "SUSE Bug 979019 for CVE-2016-4558", "url": "https://bugzilla.suse.com/979019" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4558" }, { "cve": "CVE-2016-4569", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4569" } ], "notes": [ { "category": "general", "text": "The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4569", "url": "https://www.suse.com/security/cve/CVE-2016-4569" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4569", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 979213 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979213" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4569", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4569" }, { "cve": "CVE-2016-4578", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4578" } ], "notes": [ { "category": "general", "text": "sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4578", "url": "https://www.suse.com/security/cve/CVE-2016-4578" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-4578", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 979879 for CVE-2016-4578", "url": "https://bugzilla.suse.com/979879" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-4578" }, { "cve": "CVE-2016-4951", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4951" } ], "notes": [ { "category": "general", "text": "The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4951", "url": "https://www.suse.com/security/cve/CVE-2016-4951" }, { "category": "external", "summary": "SUSE Bug 981058 for CVE-2016-4951", "url": "https://bugzilla.suse.com/981058" }, { "category": "external", "summary": "SUSE Bug 985132 for CVE-2016-4951", "url": "https://bugzilla.suse.com/985132" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4951" }, { "cve": "CVE-2016-4997", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4997" } ], "notes": [ { "category": "general", "text": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4997", "url": "https://www.suse.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4997", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986365" }, { "category": "external", "summary": "SUSE Bug 986377 for CVE-2016-4997", "url": "https://bugzilla.suse.com/986377" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-4997", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-4997" }, { "cve": "CVE-2016-4998", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-4998" } ], "notes": [ { "category": "general", "text": "The IPT_SO_SET_REPLACE setsockopt implementation in the netfilter subsystem in the Linux kernel before 4.6 allows local users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from kernel heap memory by leveraging in-container root access to provide a crafted offset value that leads to crossing a ruleset blob boundary.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-4998", "url": "https://www.suse.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "SUSE Bug 1020452 for CVE-2016-4998", "url": "https://bugzilla.suse.com/1020452" }, { "category": "external", "summary": "SUSE Bug 986362 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986362" }, { "category": "external", "summary": "SUSE Bug 986365 for CVE-2016-4998", "url": "https://bugzilla.suse.com/986365" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-4998" }, { "cve": "CVE-2016-5195", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5195" } ], "notes": [ { "category": "general", "text": "Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka \"Dirty COW.\"", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5195", "url": "https://www.suse.com/security/cve/CVE-2016-5195" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 1004419 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004419" }, { "category": "external", "summary": "SUSE Bug 1004436 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1004436" }, { "category": "external", "summary": "SUSE Bug 1006323 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006323" }, { "category": "external", "summary": "SUSE Bug 1006695 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1006695" }, { "category": "external", "summary": "SUSE Bug 1007291 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1007291" }, { "category": "external", "summary": "SUSE Bug 1008110 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1008110" }, { "category": "external", "summary": "SUSE Bug 1030118 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1030118" }, { "category": "external", "summary": "SUSE Bug 1046453 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1046453" }, { "category": "external", "summary": "SUSE Bug 1069496 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1069496" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2016-5195", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 870618 for CVE-2016-5195", "url": "https://bugzilla.suse.com/870618" }, { "category": "external", "summary": "SUSE Bug 986445 for CVE-2016-5195", "url": "https://bugzilla.suse.com/986445" }, { "category": "external", "summary": "SUSE Bug 998689 for CVE-2016-5195", "url": "https://bugzilla.suse.com/998689" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-5195" }, { "cve": "CVE-2016-5244", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5244" } ], "notes": [ { "category": "general", "text": "The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5244", "url": "https://www.suse.com/security/cve/CVE-2016-5244" }, { "category": "external", "summary": "SUSE Bug 983213 for CVE-2016-5244", "url": "https://bugzilla.suse.com/983213" }, { "category": "external", "summary": "SUSE Bug 986225 for CVE-2016-5244", "url": "https://bugzilla.suse.com/986225" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5244" }, { "cve": "CVE-2016-5829", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-5829" } ], "notes": [ { "category": "general", "text": "Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-5829", "url": "https://www.suse.com/security/cve/CVE-2016-5829" }, { "category": "external", "summary": "SUSE Bug 1053919 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1053919" }, { "category": "external", "summary": "SUSE Bug 1054127 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1054127" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-5829", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 986572 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986572" }, { "category": "external", "summary": "SUSE Bug 986573 for CVE-2016-5829", "url": "https://bugzilla.suse.com/986573" }, { "category": "external", "summary": "SUSE Bug 991651 for CVE-2016-5829", "url": "https://bugzilla.suse.com/991651" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-5829" }, { "cve": "CVE-2016-6187", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6187" } ], "notes": [ { "category": "general", "text": "The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6187", "url": "https://www.suse.com/security/cve/CVE-2016-6187" }, { "category": "external", "summary": "SUSE Bug 988307 for CVE-2016-6187", "url": "https://bugzilla.suse.com/988307" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-6187" }, { "cve": "CVE-2016-6480", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6480" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6480", "url": "https://www.suse.com/security/cve/CVE-2016-6480" }, { "category": "external", "summary": "SUSE Bug 1004418 for CVE-2016-6480", "url": "https://bugzilla.suse.com/1004418" }, { "category": "external", "summary": "SUSE Bug 991608 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991608" }, { "category": "external", "summary": "SUSE Bug 991667 for CVE-2016-6480", "url": "https://bugzilla.suse.com/991667" }, { "category": "external", "summary": "SUSE Bug 992568 for CVE-2016-6480", "url": "https://bugzilla.suse.com/992568" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6480" }, { "cve": "CVE-2016-6516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6516" } ], "notes": [ { "category": "general", "text": "Race condition in the ioctl_file_dedupe_range function in fs/ioctl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (heap-based buffer overflow) or possibly gain privileges by changing a certain count value, aka a \"double fetch\" vulnerability.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6516", "url": "https://www.suse.com/security/cve/CVE-2016-6516" }, { "category": "external", "summary": "SUSE Bug 991604 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991604" }, { "category": "external", "summary": "SUSE Bug 991669 for CVE-2016-6516", "url": "https://bugzilla.suse.com/991669" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2016-6516" }, { "cve": "CVE-2016-6828", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-6828" } ], "notes": [ { "category": "general", "text": "The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-6828", "url": "https://www.suse.com/security/cve/CVE-2016-6828" }, { "category": "external", "summary": "SUSE Bug 1052256 for CVE-2016-6828", "url": "https://bugzilla.suse.com/1052256" }, { "category": "external", "summary": "SUSE Bug 994296 for CVE-2016-6828", "url": "https://bugzilla.suse.com/994296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-6828" }, { "cve": "CVE-2016-7039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7039" } ], "notes": [ { "category": "general", "text": "The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7039", "url": "https://www.suse.com/security/cve/CVE-2016-7039" }, { "category": "external", "summary": "SUSE Bug 1001486 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001486" }, { "category": "external", "summary": "SUSE Bug 1001487 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1001487" }, { "category": "external", "summary": "SUSE Bug 1003964 for CVE-2016-7039", "url": "https://bugzilla.suse.com/1003964" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7039" }, { "cve": "CVE-2016-7042", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7042" } ], "notes": [ { "category": "general", "text": "The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7042", "url": "https://www.suse.com/security/cve/CVE-2016-7042" }, { "category": "external", "summary": "SUSE Bug 1004517 for CVE-2016-7042", "url": "https://bugzilla.suse.com/1004517" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7042" }, { "cve": "CVE-2016-7425", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7425" } ], "notes": [ { "category": "general", "text": "The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7425", "url": "https://www.suse.com/security/cve/CVE-2016-7425" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-7425", "url": "https://bugzilla.suse.com/1115893" }, { "category": "external", "summary": "SUSE Bug 999932 for CVE-2016-7425", "url": "https://bugzilla.suse.com/999932" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "low" } ], "title": "CVE-2016-7425" }, { "cve": "CVE-2016-7913", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-7913" } ], "notes": [ { "category": "general", "text": "The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-7913", "url": "https://www.suse.com/security/cve/CVE-2016-7913" }, { "category": "external", "summary": "SUSE Bug 1010478 for CVE-2016-7913", "url": "https://bugzilla.suse.com/1010478" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-7913" }, { "cve": "CVE-2016-9555", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9555" } ], "notes": [ { "category": "general", "text": "The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9555", "url": "https://www.suse.com/security/cve/CVE-2016-9555" }, { "category": "external", "summary": "SUSE Bug 1011685 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1011685" }, { "category": "external", "summary": "SUSE Bug 1012183 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1012183" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9555", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9555" }, { "cve": "CVE-2016-9576", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-9576" } ], "notes": [ { "category": "general", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 4.8.14 does not properly restrict the type of iterator, which allows local users to read or write to arbitrary kernel memory locations or cause a denial of service (use-after-free) by leveraging access to a /dev/sg device.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-9576", "url": "https://www.suse.com/security/cve/CVE-2016-9576" }, { "category": "external", "summary": "SUSE Bug 1013604 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1013604" }, { "category": "external", "summary": "SUSE Bug 1014271 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1014271" }, { "category": "external", "summary": "SUSE Bug 1017710 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1017710" }, { "category": "external", "summary": "SUSE Bug 1019079 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019079" }, { "category": "external", "summary": "SUSE Bug 1019668 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1019668" }, { "category": "external", "summary": "SUSE Bug 1115893 for CVE-2016-9576", "url": "https://bugzilla.suse.com/1115893" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-debug-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-default-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-html-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-docs-pdf-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-macros-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-build-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-obs-qa-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-pae-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-source-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syms-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-syzkaller-devel-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-base-4.8.13-1.1.x86_64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.aarch64", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.ppc64le", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.s390x", "openSUSE Tumbleweed:kernel-vanilla-devel-4.8.13-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2016-9576" } ] }
rhsa-2016:1883
Vulnerability from csaf_redhat
Published
2016-09-14 23:41
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
The kernel-rt packages have been upgraded to version 3.10.0-327.rt56.197, which provides a number of bug fixes over the previous version. (BZ#1366059)
Security Fix(es):
* A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)
* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)
* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.5.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nThe kernel-rt packages have been upgraded to version 3.10.0-327.rt56.197, which provides a number of bug fixes over the previous version. (BZ#1366059)\n\nSecurity Fix(es):\n\n* A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)\n\n* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)\n\n* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1883", "url": "https://access.redhat.com/errata/RHSA-2016:1883" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "external", "summary": "1366059", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366059" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1883.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:36:34+00:00", "generator": { "date": "2025-08-02T01:36:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1883", "initial_release_date": "2016-09-14T23:41:02+00:00", "revision_history": [ { "date": "2016-09-14T23:41:02+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-14T23:41:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-327.rt56.197.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.rt56.197.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-327.rt56.197.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "product_id": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.rt56.197.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3134", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1317383" } ], "notes": [ { "category": "description", "text": "A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: missing bounds check in ipt_entry structure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This issue is not currently planned to be addressed in future updates, as user namespaces which the flaw affects are not supported in these products. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "RHBZ#1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3134" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134" } ], "release_date": "2016-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T23:41:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1883" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: missing bounds check in ipt_entry structure" }, { "cve": "CVE-2016-4997", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349722" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: compat IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime and will be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "RHBZ#1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T23:41:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1883" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: compat IPT_SO_SET_REPLACE setsockopt" }, { "cve": "CVE-2016-4998", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349886" } ], "notes": [ { "category": "description", "text": "An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "RHBZ#1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4998", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4998" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-14T23:41:02+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1883" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-327.rt56.197.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-327.rt56.197.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-327.rt56.197.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt" } ] }
rhsa-2016:1847
Vulnerability from csaf_redhat
Published
2016-09-15 07:38
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)
* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)
* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)
Bug Fix(es):
* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1353947)
* Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario. (BZ#1362040)
* Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected. (BZ#1354302)
* Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time. (BZ#1351972)
Enhancement(s):
* With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the "-F exe=<path-to-executable>" option), which allows expression of many new audit rules. This functionality can be used to create events when specific applications perform a syscall. (BZ#1345774)
* With this update, the Nonvolatile Memory Express (NVMe) and the multi-queue block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version. Previously, a race condition between timeout and freeing request in blk_mq occurred, which could affect the blk_mq_tag_to_rq() function and consequently a kernel oops could occur. The provided patch fixes this race condition by updating the tags with the active request. The patch simplifies blk_mq_tag_to_rq() and ensures that the two requests are not active at the same time. (BZ#1350352)
* The Hyper-V storage driver (storvsc) has been upgraded from upstream. This update provides moderate performance improvement of I/O operations when using storvscr for certain workloads. (BZ#1360161)
Additional Changes:
Space precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/2592321
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)\n\n* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)\n\n* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)\n\nBug Fix(es):\n\n* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. (BZ#1353947)\n\n* Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario. (BZ#1362040)\n\n* Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected. (BZ#1354302)\n\n* Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time. (BZ#1351972)\n\nEnhancement(s):\n\n* With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the \"-F exe=\u003cpath-to-executable\u003e\" option), which allows expression of many new audit rules. This functionality can be used to create events when specific applications perform a syscall. (BZ#1345774)\n\n* With this update, the Nonvolatile Memory Express (NVMe) and the multi-queue block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version. Previously, a race condition between timeout and freeing request in blk_mq occurred, which could affect the blk_mq_tag_to_rq() function and consequently a kernel oops could occur. The provided patch fixes this race condition by updating the tags with the active request. The patch simplifies blk_mq_tag_to_rq() and ensures that the two requests are not active at the same time. (BZ#1350352)\n\n* The Hyper-V storage driver (storvsc) has been upgraded from upstream. This update provides moderate performance improvement of I/O operations when using storvscr for certain workloads. (BZ#1360161)\n\nAdditional Changes:\n\nSpace precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/2592321", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1847", "url": "https://access.redhat.com/errata/RHSA-2016:1847" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/articles/2592321", "url": "https://access.redhat.com/articles/2592321" }, { "category": "external", "summary": "1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1847.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-08-02T01:36:27+00:00", "generator": { "date": "2025-08-02T01:36:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1847", "initial_release_date": "2016-09-15T07:38:04+00:00", "revision_history": [ { "date": "2016-09-15T07:38:04+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-15T07:38:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64", "product_id": "perf-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le", "product_id": "perf-0:3.10.0-327.36.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64", "product_id": "perf-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.36.1.el7.src", "product": { "name": "kernel-0:3.10.0-327.36.1.el7.src", "product_id": "kernel-0:3.10.0-327.36.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.36.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.36.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "perf-0:3.10.0-327.36.1.el7.s390x", "product_id": "perf-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x", "product_id": "python-perf-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.36.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.36.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.36.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.36.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3134", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1317383" } ], "notes": [ { "category": "description", "text": "A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: missing bounds check in ipt_entry structure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This issue is not currently planned to be addressed in future updates, as user namespaces which the flaw affects are not supported in these products. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "RHBZ#1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3134" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134" } ], "release_date": "2016-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:38:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1847" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: missing bounds check in ipt_entry structure" }, { "cve": "CVE-2016-4997", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349722" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: compat IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime and will be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "RHBZ#1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:38:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1847" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: compat IPT_SO_SET_REPLACE setsockopt" }, { "cve": "CVE-2016-4998", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349886" } ], "notes": [ { "category": "description", "text": "An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "RHBZ#1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4998", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4998" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:38:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1847" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt" }, { "acknowledgments": [ { "names": [ "CAI Qian" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6197", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2016-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1355650" } ], "notes": [ { "category": "description", "text": "It was found that the unlink and rename functionality in overlayfs did not verify the upper dentry for staleness. A local, unprivileged user could use the rename syscall on overlayfs on top of xfs to panic or crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: missing upper dentry verification before unlink and rename", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not present in the Linux kernel packages as shipped with Red Hat Enterprise Linux versions 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6197" }, { "category": "external", "summary": "RHBZ#1355650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1355650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6197", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197" } ], "release_date": "2016-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:38:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1847" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: missing upper dentry verification before unlink and rename" }, { "acknowledgments": [ { "names": [ "CAI Qian" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6198", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2016-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1355654" } ], "notes": [ { "category": "description", "text": "A flaw was found that the vfs_rename() function did not detect hard links on overlayfs. A local, unprivileged user could use the rename syscall on overlayfs on top of xfs to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not present in the Linux kernel packages as shipped with Red Hat Enterprise Linux versions 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6198" }, { "category": "external", "summary": "RHBZ#1355654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1355654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6198", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198" } ], "release_date": "2016-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:38:04+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2016:1847" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Client-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Client-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7ComputeNode-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7ComputeNode-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Server-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Server-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.src", "7Workstation-optional-7.2.Z:kernel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-abi-whitelists-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-bootwrapper-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debug-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-s390x-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-debuginfo-common-x86_64-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-doc-0:3.10.0-327.36.1.el7.noarch", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-headers-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-kdump-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-kdump-devel-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:kernel-tools-libs-devel-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-0:3.10.0-327.36.1.el7.x86_64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.ppc64le", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.s390x", "7Workstation-optional-7.2.Z:python-perf-debuginfo-0:3.10.0-327.36.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs" } ] }
rhsa-2016:1875
Vulnerability from csaf_redhat
Published
2016-09-15 07:39
Modified
2025-08-02 01:36
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
An update for kernel-rt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.
The kernel-rt packages have been upgraded to the kernel-3.10.0-327.36.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1366538)
Security Fix(es):
* A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)
* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)
* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nThe kernel-rt packages have been upgraded to the kernel-3.10.0-327.36.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1366538)\n\nSecurity Fix(es):\n\n* A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important)\n\n* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important)\n\n* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1875", "url": "https://access.redhat.com/errata/RHSA-2016:1875" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "external", "summary": "1366538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1366538" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1875.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2025-08-02T01:36:39+00:00", "generator": { "date": "2025-08-02T01:36:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2016:1875", "initial_release_date": "2016-09-15T07:39:21+00:00", "revision_history": [ { "date": "2016-09-15T07:39:21+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-09-15T07:39:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-02T01:36:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-327.36.1.rt56.237.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-327.36.1.rt56.237.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "product": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "product_id": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-327.36.1.rt56.237.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-3134", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-03-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1317383" } ], "notes": [ { "category": "description", "text": "A security flaw was found in the Linux kernel in the mark_source_chains() function in \"net/ipv4/netfilter/ip_tables.c\". It is possible for a user-supplied \"ipt_entry\" structure to have a large \"next_offset\" field. This field is not bounds checked prior to writing to a counter value at the supplied offset.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: netfilter: missing bounds check in ipt_entry structure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6. This issue is not currently planned to be addressed in future updates, as user namespaces which the flaw affects are not supported in these products. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3134" }, { "category": "external", "summary": "RHBZ#1317383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1317383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3134", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3134" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3134" } ], "release_date": "2016-03-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:39:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1875" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: netfilter: missing bounds check in ipt_entry structure" }, { "cve": "CVE-2016-4997", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349722" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: compat IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 7, MRG-2 and realtime and will be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4997" }, { "category": "external", "summary": "RHBZ#1349722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4997", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4997" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:39:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1875" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: compat IPT_SO_SET_REPLACE setsockopt" }, { "cve": "CVE-2016-4998", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2016-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1349886" } ], "notes": [ { "category": "description", "text": "An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4998" }, { "category": "external", "summary": "RHBZ#1349886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4998", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4998" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4998" } ], "release_date": "2016-06-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:39:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1875" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: out of bounds reads when processing IPT_SO_SET_REPLACE setsockopt" }, { "acknowledgments": [ { "names": [ "CAI Qian" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6197", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2016-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1355650" } ], "notes": [ { "category": "description", "text": "It was found that the unlink and rename functionality in overlayfs did not verify the upper dentry for staleness. A local, unprivileged user could use the rename syscall on overlayfs on top of xfs to panic or crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: overlayfs: missing upper dentry verification before unlink and rename", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not present in the Linux kernel packages as shipped with Red Hat Enterprise Linux versions 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6197" }, { "category": "external", "summary": "RHBZ#1355650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1355650" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6197", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6197" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6197" } ], "release_date": "2016-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:39:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1875" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: overlayfs: missing upper dentry verification before unlink and rename" }, { "acknowledgments": [ { "names": [ "CAI Qian" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2016-6198", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2016-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1355654" } ], "notes": [ { "category": "description", "text": "A flaw was found that the vfs_rename() function did not detect hard links on overlayfs. A local, unprivileged user could use the rename syscall on overlayfs on top of xfs to crash the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue is not present in the Linux kernel packages as shipped with Red Hat Enterprise Linux versions 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6198" }, { "category": "external", "summary": "RHBZ#1355654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1355654" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6198", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6198" } ], "release_date": "2016-07-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-09-15T07:39:21+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1875" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-NFV-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-NFV-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-NFV-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.src", "7Server-RT-7.2.Z:kernel-rt-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-doc-0:3.10.0-327.36.1.rt56.237.el7.noarch", "7Server-RT-7.2.Z:kernel-rt-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-devel-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-0:3.10.0-327.36.1.rt56.237.el7.x86_64", "7Server-RT-7.2.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-327.36.1.rt56.237.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: vfs: missing detection of hardlinks in vfs_rename() on overlayfs" } ] }
ghsa-qc28-hwmc-pw94
Vulnerability from github
Published
2022-05-13 01:29
Modified
2025-04-12 13:01
Severity ?
VLAI Severity ?
Details
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
{ "affected": [], "aliases": [ "CVE-2016-4997" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2016-07-03T21:59:00Z", "severity": "HIGH" }, "details": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "id": "GHSA-qc28-hwmc-pw94", "modified": "2025-04-12T13:01:45Z", "published": "2022-05-13T01:29:28Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4997" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1847" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1875" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2016:1883" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2016-4997" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "type": "WEB", "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "type": "WEB", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40435" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/40489" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "type": "WEB", "url": "http://www.debian.org/security/2016/dsa-3607" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/91451" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1036171" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-3020-1" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
gsd-2016-4997
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2016-4997", "description": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "id": "GSD-2016-4997", "references": [ "https://www.suse.com/security/cve/CVE-2016-4997.html", "https://www.debian.org/security/2016/dsa-3607", "https://access.redhat.com/errata/RHSA-2016:1883", "https://access.redhat.com/errata/RHSA-2016:1875", "https://access.redhat.com/errata/RHSA-2016:1847", "https://ubuntu.com/security/CVE-2016-4997", "https://advisories.mageia.org/CVE-2016-4997.html", "https://alas.aws.amazon.com/cve/html/CVE-2016-4997.html", "https://linux.oracle.com/cve/CVE-2016-4997.html", "https://packetstormsecurity.com/files/cve/CVE-2016-4997" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2016-4997" ], "details": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.", "id": "GSD-2016-4997", "modified": "2023-12-13T01:21:19.170528Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.debian.org/security/2016/dsa-3607", "refsource": "MISC", "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", "refsource": "MISC", "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1847.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1875.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2016-1883.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "http://www.openwall.com/lists/oss-security/2016/06/24/5", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "name": "http://www.openwall.com/lists/oss-security/2016/09/29/10", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "name": "http://www.securityfocus.com/bid/91451", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/91451" }, { "name": "http://www.securitytracker.com/id/1036171", "refsource": "MISC", "url": "http://www.securitytracker.com/id/1036171" }, { "name": "http://www.ubuntu.com/usn/USN-3016-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "name": "http://www.ubuntu.com/usn/USN-3016-2", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "name": "http://www.ubuntu.com/usn/USN-3016-3", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "name": "http://www.ubuntu.com/usn/USN-3016-4", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "name": "http://www.ubuntu.com/usn/USN-3017-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "name": "http://www.ubuntu.com/usn/USN-3017-2", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "name": "http://www.ubuntu.com/usn/USN-3017-3", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "name": "http://www.ubuntu.com/usn/USN-3018-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "name": "http://www.ubuntu.com/usn/USN-3018-2", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "name": "http://www.ubuntu.com/usn/USN-3019-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "name": "http://www.ubuntu.com/usn/USN-3020-1", "refsource": "MISC", "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "name": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt", "refsource": "MISC", "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "name": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "MISC", "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "https://www.exploit-db.com/exploits/40435/", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/40435/" }, { "name": "https://www.exploit-db.com/exploits/40489/", "refsource": "MISC", "url": "https://www.exploit-db.com/exploits/40489/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.18.37", "versionStartIncluding": "3.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.1.28", "versionStartIncluding": "3.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.10.103", "versionStartIncluding": "3.3", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.4.14", "versionStartIncluding": "4.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.16.37", "versionStartIncluding": "3.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.2.80", "versionStartIncluding": "2.6.17", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.12.62", "versionStartIncluding": "3.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.14.73", "versionStartIncluding": "3.13", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_module_for_public_cloud:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_live_patching:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_real_time_extension:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:novell:suse_linux_enterprise_workstation_extension:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2016-4997" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-264" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/06/24/5" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.3" }, { "name": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/ce683e5f9d045e5d67d1312a42b359cb2ab2a13c" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349722" }, { "name": "USN-3017-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-2" }, { "name": "USN-3018-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-2" }, { "name": "SUSE-SU-2016:1710", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "name": "USN-3016-4", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-4" }, { "name": "USN-3016-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-1" }, { "name": "USN-3016-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-2" }, { "name": "USN-3016-3", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3016-3" }, { "name": "USN-3018-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3018-1" }, { "name": "USN-3019-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3019-1" }, { "name": "SUSE-SU-2016:1709", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "name": "USN-3017-3", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-3" }, { "name": "USN-3020-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3020-1" }, { "name": "USN-3017-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-3017-1" }, { "name": "SUSE-SU-2016:1937", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00000.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html" }, { "name": "[oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call", "refsource": "MLIST", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2016/09/29/10" }, { "name": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nccgroup/TriforceLinuxSyscallFuzzer/tree/master/crash_reports/report_compatIpt" }, { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html" }, { "name": "SUSE-SU-2016:2181", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00054.html" }, { "name": "SUSE-SU-2016:2179", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00052.html" }, { "name": "DSA-3607", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2016/dsa-3607" }, { "name": "SUSE-SU-2016:2178", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00051.html" }, { "name": "1036171", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1036171" }, { "name": "SUSE-SU-2016:1985", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "name": "91451", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/91451" }, { "name": "openSUSE-SU-2016:2184", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00055.html" }, { "name": "SUSE-SU-2016:2180", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00053.html" }, { "name": "SUSE-SU-2016:2174", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00048.html" }, { "name": "SUSE-SU-2016:2177", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00050.html" }, { "name": "SUSE-SU-2016:2105", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00044.html" }, { "name": "SUSE-SU-2016:2018", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541" }, { "name": "40489", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40489/" }, { "name": "40435", "refsource": "EXPLOIT-DB", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/40435/" }, { "name": "RHSA-2016:1883", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1883.html" }, { "name": "RHSA-2016:1875", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1875.html" }, { "name": "RHSA-2016:1847", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1847.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-09-12T14:55Z", "publishedDate": "2016-07-03T21:59Z" } } }
wid-sec-w-2024-0144
Vulnerability from csaf_certbund
Published
2016-06-26 22:00
Modified
2024-01-17 23:00
Summary
Linux Kernel: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Der Kernel stellt den Kern des Linux Betriebssystems dar.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um seine Privilegien zu erhöhen und um einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- Linux
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um seine Privilegien zu erh\u00f6hen und um einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0144 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2016/wid-sec-w-2024-0144.json" }, { "category": "self", "summary": "WID-SEC-2024-0144 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0144" }, { "category": "external", "summary": "Meldung auf seclists.org vom 2016-06-26", "url": "http://seclists.org/oss-sec/2016/q2/599" }, { "category": "external", "summary": "vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3020-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3019-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3019-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3018-2 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3018-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3018-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3018-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3016-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3016-4/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3017-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3017-3/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3017-2 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3017-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3017-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3017-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3016-3 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3016-3/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3016-2 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3016-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3016-1 vom 2016-06-28", "url": "http://www.ubuntu.com/usn/usn-3016-1/" }, { "category": "external", "summary": "XEN Security Advisory XSA-171 vom 2016-06-28", "url": "https://www.debian.org/security/2016/dsa-3607" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1710-1 vom 2016-06-30", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00061.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1709-1 vom 2016-06-30", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-06/msg00060.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1937-1 vom 2016-08-02", "url": "https://www.suse.com/de-de/support/update/announcement/2016/suse-su-20161937-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:1985-1 vom 2016-08-08", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00007.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2018-1 vom 2016-08-09", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-08/msg00027.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2181-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162181-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2174-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162174-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2179-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162179-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2180-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162180-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2178-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162178-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2177-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162177-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2105-1 vom 2016-09-03", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162105-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1847 vom 2016-09-14", "url": "https://access.redhat.com/errata/RHSA-2016:1847" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1883 vom 2016-09-14", "url": "https://access.redhat.com/errata/RHSA-2016:1883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2016:1875 vom 2016-09-14", "url": "https://access.redhat.com/errata/RHSA-2016:1875" }, { "category": "external", "summary": "Exploit-DB #40435 vom 2016-09-29", "url": "https://www.exploit-db.com/exploits/40435/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2636-1 vom 2016-10-26", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2633-1 vom 2016-10-26", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2632-1 vom 2016-10-26", "url": "https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2659-1 vom 2016-10-27", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162659-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2658-1 vom 2016-10-27", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162658-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2655-1 vom 2016-10-27", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162655-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:2976-1 vom 2016-12-02", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20162976-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:3069-1 vom 2016-12-09", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163069-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2016:3304-1 vom 2016-12-30", "url": "https://www.suse.com/support/update/announcement/2016/suse-su-20163304-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0036 vom 2017-01-10", "url": "https://access.redhat.com/errata/RHSA-2017:0036" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2017:0036 vom 2017-01-13", "url": "https://lwn.net/Alerts/711554" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0333-1 vom 2017-01-31", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170333-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0471-1 vom 2017-02-16", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170471-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3338-1 vom 2017-06-21", "url": "http://www.ubuntu.com/usn/usn-3338-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3338-2 vom 2017-06-29", "url": "http://www.ubuntu.com/usn/usn-3338-2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:1990-1 vom 2017-07-28", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171990-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:2342-1 vom 2017-09-05", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172342-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3020-1 vom 2024-01-17", "url": "https://tanzu.vmware.com/security/usn-3020-1" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-08-15T18:03:57.253+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-0144", "initial_release_date": "2016-06-26T22:00:00.000+00:00", "revision_history": [ { "date": "2016-06-26T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2016-06-26T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2016-06-27T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2016-06-27T22:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2016-06-27T22:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2016-06-28T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2016-06-28T22:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2016-06-30T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2016-06-30T22:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2016-08-02T22:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2016-08-08T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2016-08-09T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2016-09-04T22:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "15", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "16", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "17", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "20", "summary": "Version nicht vorhanden" }, { "date": "2016-09-14T22:00:00.000+00:00", "number": "21", "summary": "Version nicht vorhanden" }, { "date": "2016-10-25T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2016-10-26T22:00:00.000+00:00", "number": "23", "summary": "New remediations available" }, { "date": "2016-12-04T23:00:00.000+00:00", "number": "24", "summary": "New remediations available" }, { "date": "2016-12-11T23:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2017-01-01T23:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2017-01-10T23:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2017-01-15T23:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2017-01-15T23:00:00.000+00:00", "number": "29", "summary": "Version nicht vorhanden" }, { "date": "2017-01-30T23:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2017-02-15T23:00:00.000+00:00", "number": "31", "summary": "New remediations available" }, { "date": "2017-06-21T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2017-06-29T22:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2017-07-30T22:00:00.000+00:00", "number": "34", "summary": "New remediations available" }, { "date": "2017-09-04T22:00:00.000+00:00", "number": "35", "summary": "New remediations available" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "36", "summary": "Neue Updates von Ubuntu aufgenommen" } ], "status": "final", "version": "36" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS 6", "product": { "name": "Open Source CentOS 6", "product_id": "160056", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:6" } } }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel \u003c 3.14.73", "product": { "name": "Open Source Linux Kernel \u003c 3.14.73", "product_id": "T007917", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:3.14.73" } } }, { "category": "product_name", "name": "Open Source Linux Kernel \u003c 4.4.14", "product": { "name": "Open Source Linux Kernel \u003c 4.4.14", "product_id": "T007918", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.4.14" } } }, { "category": "product_name", "name": "Open Source Linux Kernel \u003c 4.6.3", "product": { "name": "Open Source Linux Kernel \u003c 4.6.3", "product_id": "T007919", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:4.6.3" } } } ], "category": "product_name", "name": "Linux Kernel" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T007578", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise MRG 2.5", "product": { "name": "Red Hat Enterprise MRG 2.5", "product_id": "266755", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2.5" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "131442", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:10.04:-:lts" } } }, { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "product_name", "name": "Linux" } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-4997", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Linux Kernel im Zusammenhang mit compat_setsockopt(). Ein angemeldeter, lokaler Angreifer kann diese Schwachstelle nutzen, um aus einem Container compat_setsockopt() aufzurufen und dadurch seine Rechte zu erh\u00f6hen." } ], "product_status": { "known_affected": [ "131442", "266755", "T007578", "2951", "T002207", "T000126", "160056", "T004914" ] }, "release_date": "2016-06-26T22:00:00.000+00:00", "title": "CVE-2016-4997" }, { "cve": "CVE-2016-4998", "notes": [ { "category": "description", "text": "Es existiert eine Denial of Service Schwachstelle in Linux Kernel. Ein angemeldeter, lokaler Angreifer kann diese Schwachstelle nutzen, um einen Zugriff au\u00dferhalb des eigenen Heapbereichs zu erwzingen und dadurch das System zum Absturz zu bringen oder Informationen offenzulegen." } ], "product_status": { "known_affected": [ "T000126", "T004914" ] }, "release_date": "2016-06-26T22:00:00.000+00:00", "title": "CVE-2016-4998" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…